Skip to content

Commit cf7caaf

Browse files
authored
Merge pull request #116201 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents a9784a3 + bfe98c3 commit cf7caaf

File tree

173 files changed

+2467
-1343
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

173 files changed

+2467
-1343
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -439,6 +439,11 @@
439439
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-xamarin-getting-started",
440440
"branch": "master"
441441
},
442+
{
443+
"path_to_root": "cosmosdb-python-sdk",
444+
"url": "https://github.com/Azure/azure-sdk-for-python/",
445+
"branch": "master"
446+
},
442447
{
443448
"path_to_root": "cosmosdb-nodejs-get-started",
444449
"url": "https://github.com/Azure-Samples/azure-cosmos-db-sql-api-nodejs-getting-started",

.openpublishing.redirection.json

Lines changed: 16 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -781,6 +781,11 @@
781781
"redirect_url": "/azure/cognitive-services/Content-Moderator/client-libraries?pivots=programming-language-python",
782782
"redirect_document_id": false
783783
},
784+
{
785+
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-list-entity.md",
786+
"redirect_url": "/azure/cognitive-services/luis/reference-entity-list",
787+
"redirect_document_id": false
788+
},
784789
{
785790
"source_path": "articles/cognitive-services/QnAMaker/Tutorials/integrate-qnamaker-luis.md",
786791
"redirect_url": "/azure/cognitive-services/luis/choose-natural-language-processing-service",
@@ -2500,12 +2505,12 @@
25002505
},
25012506
{
25022507
"source_path": "articles/cosmos-db/analytics-usecases.md",
2503-
"redirect_url": "/azure/cosmos-db/synapse-link",
2508+
"redirect_url": "/azure/cosmos-db/synapse-link-use-cases",
25042509
"redirect_document_id": true
25052510
},
25062511
{
25072512
"source_path": "articles/cosmos-db/analytics-solution-architectures.md",
2508-
"redirect_url": "/azure/cosmos-db/synapse-link",
2513+
"redirect_url": "/azure/cosmos-db/synapse-link-use-cases",
25092514
"redirect_document_id": false
25102515
},
25112516
{
@@ -2515,7 +2520,7 @@
25152520
},
25162521
{
25172522
"source_path": "articles/cosmos-db/globally-distributed-transactional-analytical-storage.md",
2518-
"redirect_url": "/azure/cosmos-db/synapse-link",
2523+
"redirect_url": "/azure/cosmos-db/analytical-store-introduction",
25192524
"redirect_document_id": false
25202525
},
25212526
{
@@ -42719,7 +42724,7 @@
4271942724
{
4272042725
"source_path": "articles/application-insights/app-insights-usage-workbooks.md",
4272142726
"redirect_url": "/azure/azure-monitor/app/usage-workbooks",
42722-
"redirect_document_id": true
42727+
"redirect_document_id": false
4272342728
},
4272442729
{
4272542730
"source_path": "articles/application-insights/app-insights-visual-studio-codelens.md",
@@ -52428,12 +52433,17 @@
5242852433
"source_path": "articles/sql-database/sql-database-auditing-and-threat-detection-powershell.md",
5242952434
"redirect_url": "/azure/sql-database/scripts/sql-database-auditing-and-threat-detection-powershell",
5243052435
"redirect_document_id": true
52431-
},
52432-
{
52436+
},
52437+
{
5243352438
"source_path": "articles/cdn/endpoint-multiorigin.md",
5243452439
"redirect_url": "/azure/cdn/cdn-overview",
5243552440
"redirect_document_id": false
5243652441
},
52442+
{
52443+
"source_path": "articles/azure-monitor/app/usage-workbooks.md",
52444+
"redirect_url": "/azure/azure-monitor/platform/workbooks-overview",
52445+
"redirect_document_id": false
52446+
},
5243752447
{
5243852448
"source_path": "articles/batch/batch-api-basics.md",
5243952449
"redirect_url": "/azure/batch/batch-service-workflow-features",

articles/active-directory/app-provisioning/workday-attribute-reference.md

Lines changed: 43 additions & 33 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Enable combined security information registration in Azure Active Directory
1919

20-
Before combined registration, users registered authentication methods for Azure Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Multi-Factor Authentication and SSPR.
20+
Before combined registration, users registered authentication methods for Azure Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for Azure Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Azure Multi-Factor Authentication and SSPR.
2121

2222
Before enabling the new experience, review the article [Combined security information registration](concept-registration-mfa-sspr-combined.md) to ensure you understand the functionality and effects of this feature.
2323

@@ -31,10 +31,10 @@ Complete these steps to enable combined registration:
3131
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature preview settings**.
3232
3. Under **Users can use the combined security information registration experience**, choose to enable for a **Selected** group of users or for **All** users.
3333

34-
![Enable the combined security info preview experience for All users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info-preview.png)
34+
![Enable the combined security info experience for users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info.png)
3535

3636
> [!NOTE]
37-
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Multi-Factor Authentication and SSPR, if those methods are enabled in the Multi-Factor Authentication and SSPR policies. If you then disable this experience, users who go to the previous SSPR registration page at `https://aka.ms/ssprsetup` will be required to perform multi-factor authentication before they can access the page.
37+
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Azure Multi-Factor Authentication and SSPR, if those methods are enabled in the Azure Multi-Factor Authentication and SSPR policies. If you then disable this experience, users who go to the previous SSPR registration page at `https://aka.ms/ssprsetup` will be required to perform multi-factor authentication before they can access the page.
3838
3939
If you have configured the Site to Zone Assignment List in Internet Explorer, the following sites have to be in the same zone:
4040

@@ -52,8 +52,8 @@ For more information about creating trusted locations in Conditional Access, see
5252

5353
The following policy applies to all selected users that attempt to register using the combined registration experience, and blocks access unless they are connecting from a location marked as trusted network.
5454

55-
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**
56-
1. Select **+ New policy**
55+
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**.
56+
1. Select **+ New policy**.
5757
1. Enter a name for this policy, such as *Combined Security Info Registration on Trusted Networks*.
5858
1. Under **Assignments**, select **Users and groups**. Choose the users and groups you want this policy to apply to, then select **Done**.
5959

@@ -65,20 +65,20 @@ The following policy applies to all selected users that attempt to register usin
6565
![Create a conditional access policy to control security info registration](media/howto-registration-mfa-sspr-combined/require-registration-from-trusted-location.png)
6666

6767
1. Under **Conditions** > **Locations**, configure the following options:
68-
1. Configure **Yes**
69-
1. Include **Any location**
70-
1. Exclude **All trusted locations**
68+
1. Configure **Yes**.
69+
1. Include **Any location**.
70+
1. Exclude **All trusted locations**.
7171
1. Select **Done** on the *Locations* window, then select **Done** on the *Conditions* window.
72-
1. Under **Access controls** > **Grant**, choose **Block access**, then **Select**
73-
1. Set **Enable policy** to **On**
74-
1. To finalize the policy, select **Create**
72+
1. Under **Access controls** > **Grant**, choose **Block access**, then **Select**.
73+
1. Set **Enable policy** to **On**.
74+
1. To finalize the policy, select **Create**.
7575

7676
## Next steps
7777

7878
If you need help, see how to [troubleshoot combined security info registration](howto-registration-mfa-sspr-combined-troubleshoot.md) or learn [What is the location condition in Azure Active Directory Conditional Access?](../conditional-access/location-condition.md)
7979

8080
To enable the features in your Azure AD tenant, see the tutorials to [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
8181

82-
Learn how to [enable combined registration in your tenant](howto-registration-mfa-sspr-combined.md) or [force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options).
82+
Learn how to [force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options).
8383

8484
You can also review the [available methods for Azure Multi-Factor Authentication and SSPR](concept-authentication-methods.md).
Loading

articles/active-directory/conditional-access/overview.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,15 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: overview
9-
ms.date: 05/20/2020
9+
ms.date: 05/21/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: daveba
1414
ms.reviewer: calebb
1515

1616
ms.collection: M365-identity-device-management
17+
ms.custom: contperfq4
1718
---
1819
# What is Conditional Access?
1920

@@ -68,7 +69,7 @@ Common signals that Conditional Access can take in to account when making a poli
6869

6970
## Commonly applied policies
7071

71-
Many organizations have common access concerns that Conditional Access policies can help with such as:
72+
Many organizations have [common access concerns that Conditional Access policies can help with](concept-conditional-access-policy-common.md) such as:
7273

7374
- Requiring multi-factor authentication for users with administrative roles
7475
- Requiring multi-factor authentication for Azure management tasks
@@ -93,12 +94,8 @@ Customers with [Microsoft 365 Business licenses](/office365/servicedescriptions/
9394

9495
## Next steps
9596

96-
[Building a Conditional Access policy piece by piece](concept-conditional-access-policies.md)
97-
98-
To learn how to implement Conditional Access in your environment, see [Plan your Conditional Access deployment in Azure Active Directory](plan-conditional-access.md).
99-
100-
[Learn about Identity Protection](../identity-protection/overview-v2.md)
101-
102-
[Learn about Microsoft Cloud App Security](/cloud-app-security/what-is-cloud-app-security)
103-
104-
[Learn about Microsoft Intune](/intune/index)
97+
- [Building a Conditional Access policy piece by piece](concept-conditional-access-policies.md)
98+
- [Plan your Conditional Access deployment](plan-conditional-access.md)
99+
- [Learn about Identity Protection](../identity-protection/overview-v2.md)
100+
- [Learn about Microsoft Cloud App Security](/cloud-app-security/what-is-cloud-app-security)
101+
- [Learn about Microsoft Intune](/intune/index)

articles/active-directory/fundamentals/concept-fundamentals-mfa-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ So how does your organization turn on MFA even for free, before becoming a stati
2929

3030
Customers who are utilizing the free benefits of Azure AD can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to enable multi-factor authentication in their environment.
3131

32-
## Office 365 Business Premium, E3, or E5
32+
## Microsoft 365 Business, E3, or E5
3333

3434
For customers with Office 365, there are two options:
3535

articles/active-directory/governance/entitlement-management-logs-and-reporting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -188,5 +188,5 @@ $bResponse.Results |ft
188188
```
189189

190190
## Next steps:
191-
- [Create interactive reports with Azure Monitor workbooks](../../azure-monitor/app/usage-workbooks.md)
191+
- [Create interactive reports with Azure Monitor workbooks](../../azure-monitor/platform/workbooks-overview.md)
192192

0 commit comments

Comments
 (0)