Skip to content

Commit cf22e03

Browse files
committed
Merge branch 'main' into release-postgresql-single-server-deprecate
2 parents 4156b4c + 9d0fa0f commit cf22e03

File tree

328 files changed

+2493
-5293
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

328 files changed

+2493
-5293
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -982,6 +982,7 @@
982982
".openpublishing.redirection.security-benchmark.json",
983983
".openpublishing.redirection.sql-database.json",
984984
".openpublishing.redirection.virtual-desktop.json",
985+
".openpublishing.redirection.devops-project.json",
985986
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-old.json",
986987
"articles/applied-ai-services/.openpublishing.redirection.applied-ai-services.json",
987988
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
Lines changed: 119 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,119 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path": "articles/devops-project/azure-devops-project-aks.md",
5+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-aks",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/devops-project/azure-devops-project-aspnet-core.md",
10+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-aspnet-core",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/devops-project/azure-devops-project-cosmos-db.md",
15+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-cosmos-db",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "articles/devops-project/azure-devops-project-functions.md",
20+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-functions",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "articles/devops-project/azure-devops-project-github.md",
25+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-github",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "articles/devops-project/azure-devops-project-go.md",
30+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-go",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "articles/devops-project/azure-devops-project-java.md",
35+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-java",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "articles/devops-project/azure-devops-project-nodejs.md",
40+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-nodejs",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "articles/devops-project/azure-devops-project-php.md",
45+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-php",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "articles/devops-project/azure-devops-project-python.md",
50+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-python",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "articles/devops-project/azure-devops-project-ruby.md",
55+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-ruby",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "articles/devops-project/azure-devops-project-service-fabric.md",
60+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-service-fabric",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "articles/devops-project/azure-devops-project-sql-database.md",
65+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-sql-database",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path": "articles/devops-project/azure-devops-project-vms.md",
70+
"redirect_url": "/previous-versions/azure/devops-project/azure-devops-project-vms",
71+
"redirect_document_id": false
72+
},
73+
{
74+
"source_path": "articles/devops-project/devops-starter-gh-nodejs.md",
75+
"redirect_url": "/previous-versions/azure/devops-project/devops-starter-gh-nodejs",
76+
"redirect_document_id": false
77+
},
78+
{
79+
"source_path": "articles/devops-project/devops-starter-gh-web-app.md",
80+
"redirect_url": "/previous-versions/azure/devops-project/devops-starter-gh-web-app",
81+
"redirect_document_id": false
82+
},
83+
{
84+
"source_path": "articles/devops-project/overview.md",
85+
"redirect_url": "/previous-versions/azure/devops-project/overview",
86+
"redirect_document_id": false
87+
},
88+
{
89+
"source_path": "articles/devops-project/index.md",
90+
"redirect_url": "/previous-versions/azure/devops-project/overview",
91+
"redirect_document_id": false
92+
},
93+
{
94+
"source_path": "articles/devops-project/retirement-and-migration.md",
95+
"redirect_url": "/previous-versions/azure/devops-project/retirement-and-migration",
96+
"redirect_document_id": false
97+
},
98+
{
99+
"source_path": "articles/virtual-machines/linux/tutorial-azure-devops-blue-green-strategy.md",
100+
"redirect_url": "/previous-versions/azure/virtual-machines/linux/tutorial-azure-devops-blue-green-strategy",
101+
"redirect_document_id": false
102+
},
103+
{
104+
"source_path": "articles/virtual-machines/linux/tutorial-azure-devops-canary-strategy.md",
105+
"redirect_url": "/previous-versions/azure/virtual-machines/linux/tutorial-azure-devops-canary-strategy",
106+
"redirect_document_id": false
107+
},
108+
{
109+
"source_path": "articles/virtual-machines/linux/tutorial-build-deploy-azure-pipelines.md",
110+
"redirect_url": "/previous-versions/azure/virtual-machines/linux/tutorial-build-deploy-azure-pipelines",
111+
"redirect_document_id": false
112+
},
113+
{
114+
"source_path": "articles/aks/deployment-center-launcher.md",
115+
"redirect_url": "/previous-versions/azure/aks/deployment-center-launcher",
116+
"redirect_document_id": false
117+
}
118+
]
119+
}

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 32 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,13 +91,21 @@ To update certificate user IDs for federated users, configure Azure AD Connect t
9191

9292
### Synchronize X509:\<PN>PrincipalNameValue
9393

94-
To synchronize X509:\<PN>PrincipalNameValue, create an outbound synchronization rule, and choose **Expression** in the flow type. Choose the target attribute as \<certificateUserIds>, and in the source field, add the expression <"X509:\<PN>"&[userPrincipalName]>. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
94+
To synchronize X509:\<PN>PrincipalNameValue, create an outbound synchronization rule, and choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
95+
96+
```
97+
"X509:\<PN>"&[userPrincipalName]
98+
```
9599

96100
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/pnexpression.png" alt-text="Screenshot of how to sync x509.":::
97101

98102
### Synchronize X509:\<RFC822>RFC822Name
99103

100-
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule, choose **Expression** in the flow type. Choose the target attribute as \<certificateUserIds>, and in the source field, add the expression <"X509:\<RFC822>"&[userPrincipalName]>. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
104+
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule, choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
105+
106+
```
107+
"X509:\<RFC822>"&[userPrincipalName]
108+
```
101109

102110
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/rfc822expression.png" alt-text="Screenshot of how to sync RFC822Name.":::
103111

@@ -122,11 +130,33 @@ AlternativeSecurityId isn't part of the default attributes. An administrator nee
122130

123131
1. Create an inbound synchronization rule to transform from altSecurityIdentities to alternateSecurityId attribute.
124132

133+
In the inbound rule, use the following options.
134+
135+
|Option | Value |
136+
|-------|-------|
137+
|Name | Descriptive name of the rule, such as: In from AD - altSecurityIdentities |
138+
|Connected System | Your on-premises AD domain |
139+
|Connected System Object Type | user |
140+
|Metaverse Object Type | person |
141+
|Precedence | Choose a random high number not currently used |
142+
143+
Then proceed to the Transformations tab and do a direct mapping of the target attribute of **alternativeSecurityId** to **altSecurityIdentities** as shown below.
144+
125145
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/alt-security-identity-inbound.png" alt-text="Screenshot of how to transform from altSecurityIdentities to alternateSecurityId attribute":::
126146

127147
1. Create an outbound synchronization rule to transform from alternateSecurityId attribute to certificateUserIds
128148
alt-security-identity-add.
129149

150+
|Option | Value |
151+
|-------|-------|
152+
|Name | Descriptive name of the rule, such as: Out to AAD - certificateUserIds |
153+
|Connected System | Your Azure AD doamin |
154+
|Connected System Object Type | user |
155+
|Metaverse Object Type | person |
156+
|Precedence | Choose a random high number not currently used |
157+
158+
Then proceed to the Transformations tab and change your FlowType option to *Expression*, the target attribute to **certificateUserIds** and then input the below expression in to the Source field.
159+
130160
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/alt-security-identity-outbound.png" alt-text="Screenshot of outbound synchronization rule to transform from alternateSecurityId attribute to certificateUserIds":::
131161

132162
To map the pattern supported by certificateUserIds, administrators must use expressions to set the correct value.

articles/active-directory/authentication/howto-authentication-passwordless-security-key.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Registration features for passwordless authentication methods rely on the combin
4747

4848
1. Sign in to the [Azure portal](https://portal.azure.com).
4949
1. Browse to **Azure Active Directory** > **Security** > **Authentication methods** > **Authentication method policy**.
50-
1. Under the method **FIDO2 Security Key**, click **All users**, or click **Add groups** to select specific groups.
50+
1. Under the method **FIDO2 Security Key**, click **All users**, or click **Add groups** to select specific groups. *Only security groups are supported*.
5151
1. **Save** the configuration.
5252

5353
>[!NOTE]

articles/active-directory/authentication/howto-mfa-nps-extension-errors.md

Lines changed: 3 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -98,37 +98,12 @@ If your users are [Having trouble with two-step verification](https://support.mi
9898

9999
### Health check script
100100

101-
The [Azure AD MFA NPS Extension health check script](/samples/azure-samples/azure-mfa-nps-extension-health-check/azure-mfa-nps-extension-health-check/) performs a basic health check when troubleshooting the NPS extension. Run the script and choose option 3.
101+
The [Azure AD MFA NPS Extension health check script](/samples/azure-samples/azure-mfa-nps-extension-health-check/azure-mfa-nps-extension-health-check/) performs a basic health check when troubleshooting the NPS extension. Run the script and choose option **1** to isolate the cause of the potential issue.
102102

103103
### Contact Microsoft support
104104

105105
If you need additional help, contact a support professional through [Azure Multi-Factor Authentication Server support](https://support.microsoft.com/oas/default.aspx?prid=14947). When contacting us, it's helpful if you can include as much information about your issue as possible. Information you can supply includes the page where you saw the error, the specific error code, the specific session ID, the ID of the user who saw the error, and debug logs.
106106

107-
To collect debug logs for support diagnostics, use the following steps on the NPS server:
107+
To collect debug logs for support diagnostics, run the [Azure AD MFA NPS Extension health check script](/samples/azure-samples/azure-mfa-nps-extension-health-check/azure-mfa-nps-extension-health-check/) on the NPS server and choose option **4** to collect logs.
108108

109-
1. Open Registry Editor and browse to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa set **VERBOSE_LOG** to **TRUE**
110-
2. Open an Administrator command prompt and run these commands:
111-
112-
```
113-
Mkdir c:\NPS
114-
Cd c:\NPS
115-
netsh trace start Scenario=NetConnection capture=yes tracefile=c:\NPS\nettrace.etl
116-
logman create trace "NPSExtension" -ow -o c:\NPS\NPSExtension.etl -p {7237ED00-E119-430B-AB0F-C63360C8EE81} 0xffffffffffffffff 0xff -nb 16 16 -bs 1024 -mode Circular -f bincirc -max 4096 -ets
117-
logman update trace "NPSExtension" -p {EC2E6D3A-C958-4C76-8EA4-0262520886FF} 0xffffffffffffffff 0xff -ets
118-
```
119-
120-
3. Reproduce the issue
121-
122-
4. Stop the tracing with these commands:
123-
124-
```
125-
logman stop "NPSExtension" -ets
126-
netsh trace stop
127-
wevtutil epl AuthNOptCh C:\NPS\%computername%_AuthNOptCh.evtx
128-
wevtutil epl AuthZOptCh C:\NPS\%computername%_AuthZOptCh.evtx
129-
wevtutil epl AuthZAdminCh C:\NPS\%computername%_AuthZAdminCh.evtx
130-
Start .
131-
```
132-
133-
5. Open Registry Editor and browse to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa set **VERBOSE_LOG** to **FALSE**
134-
6. Zip the contents of the C:\NPS folder and attach the zipped file to the support case.
109+
At the end, zip the contents of the C:\NPS folder and attach the zipped file to the support case.

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -326,9 +326,7 @@ You can choose to create this key and set it to *FALSE* while your users are onb
326326

327327
### NPS extension health check script
328328

329-
The following script is available to perform basic health check steps when troubleshooting the NPS extension.
330-
331-
[MFA_NPS_Troubleshooter.ps1](/samples/azure-samples/azure-mfa-nps-extension-health-check/azure-mfa-nps-extension-health-check/)
329+
The [Azure AD MFA NPS Extension health check script](/samples/azure-samples/azure-mfa-nps-extension-health-check/azure-mfa-nps-extension-health-check/) performs a basic health check when troubleshooting the NPS extension. Run the script and choose one of available options.
332330

333331
### How to fix the error "Service principal was not found" while running `AzureMfaNpsExtnConfigSetup.ps1` script?
334332

articles/active-directory/authentication/howto-mfaserver-deploy.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -128,11 +128,10 @@ Now that you have downloaded the server you can install and configure it. Be sur
128128

129129
1. Double-click the executable.
130130
2. On the Select Installation Folder screen, make sure that the folder is correct and click **Next**.
131-
3. Once the installation is complete, click **Finish**. The configuration wizard launches.
132-
4. On the configuration wizard welcome screen, check **Skip using the Authentication Configuration Wizard** and click **Next**. The wizard closes and the server starts.
133-
134-
![Skip using the Authentication Configuration Wizard](./media/howto-mfaserver-deploy/skip2.png)
135-
131+
The following libraries are installed:
132+
* [Visual C++ Redistributable for Visual Studio 2017 (x64)](https://go.microsoft.com/fwlink/?LinkId=746572)
133+
* [Visual C++ Redistributable for Visual Studio 2017 (x86)](https://go.microsoft.com/fwlink/?LinkId=746571)
134+
3. When the installation finishes, select **Finish**. The configuration wizard starts.
136135
5. Back on the page that you downloaded the server from, click the **Generate Activation Credentials** button. Copy this information into the Azure MFA Server in the boxes provided and click **Activate**.
137136

138137
> [!NOTE]
@@ -223,4 +222,4 @@ Once you have upgraded to or installed MFA Server version 8.x or higher, it is r
223222
- Set up and configure the Azure MFA Server with [Active Directory Federation Service](multi-factor-authentication-get-started-adfs.md), [RADIUS Authentication](howto-mfaserver-dir-radius.md), or [LDAP Authentication](howto-mfaserver-dir-ldap.md).
224223
- Set up and configure [Remote Desktop Gateway and Azure Multi-Factor Authentication Server using RADIUS](howto-mfaserver-nps-rdg.md).
225224
- [Deploy the Azure Multi-Factor Authentication Server Mobile App Web Service](howto-mfaserver-deploy-mobileapp.md).
226-
- [Advanced scenarios with Azure Multi-Factor Authentication and third-party VPNs](howto-mfaserver-nps-vpn.md).
225+
- [Advanced scenarios with Azure Multi-Factor Authentication and third-party VPNs](howto-mfaserver-nps-vpn.md).

articles/active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ With password writeback enabled in Azure AD Connect cloud sync, now verify, and
4747
To verify and enable password writeback in SSPR, complete the following steps:
4848
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global Administrator account.
4949
1. Search for and select **Azure Active Directory**, select **Password reset**, then choose **On-premises integration**.
50-
1. Check the option for **Write back passwords to your on-premises directory** .
50+
1. Check the option for **Enable password write back for synced users** .
5151
1. (optional) If Azure AD Connect provisioning agents are detected, you can additionally check the option for **Write back passwords with Azure AD Connect cloud sync**.
5252
3. Check the option for **Allow users to unlock accounts without resetting their password** to *Yes*.
5353

@@ -68,7 +68,7 @@ If you no longer want to use the SSPR writeback functionality you have configure
6868

6969
1. Sign in to the [Azure portal](https://portal.azure.com).
7070
1. Search for and select **Azure Active Directory**, select **Password reset**, then choose **On-premises integration**.
71-
1. Uncheck the option for **Write back passwords to your on-premises directory**.
71+
1. Uncheck the option for **Enable password write back for synced users**.
7272
1. Uncheck the option for **Write back passwords with Azure AD Connect cloud sync**.
7373
1. Uncheck the option for **Allow users to unlock accounts without resetting their password**.
7474
1. When ready, select **Save**.

0 commit comments

Comments
 (0)