Skip to content

Commit cf7f0f3

Browse files
committed
2 parents 5fed56b + 5d11cb6 commit cf7f0f3

File tree

231 files changed

+2755
-1616
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

231 files changed

+2755
-1616
lines changed

.openpublishing.redirection.json

Lines changed: 34 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -658,12 +658,12 @@
658658
"redirect_url": "/azure/frontdoor/rules-match-conditions",
659659
"redirect_document_id": false
660660
},
661-
{
661+
{
662662
"source_path_from_root": "/articles/frontdoor/standard-premium/geo-filtering.md",
663663
"redirect_url": "/articles/frontdoor/front-door-geo-filtering",
664664
"redirect_document_id": false
665665
},
666-
{
666+
{
667667
"source_path_from_root": "/articles/frontdoor/standard-premium/edge-locations.md",
668668
"redirect_url": "/azure/frontdoor/edge-locations-by-region",
669669
"redirect_document_id": false
@@ -7679,8 +7679,8 @@
76797679
"redirect_document_id": false
76807680
},
76817681

7682-
7683-
7682+
7683+
76847684
{
76857685
"source_path_from_root": "/articles/cognitive-services/text-analytics/how-tos/text-analytics-how-to-use-container-instances.md",
76867686
"redirect_url": "/azure/cognitive-services/containers/azure-container-instance-recipe",
@@ -14387,6 +14387,11 @@
1438714387
"redirect_url": "/azure/data-explorer/",
1438814388
"redirect_document_id": false
1438914389
},
14390+
{
14391+
"source_path_from_root": "/articles/cognitive-services/QnAMaker/Tutorials/migrate-knowledge-base.md",
14392+
"redirect_url": "/azure/cognitive-services/QnAMaker/Tutorials/export-knowledge-base",
14393+
"redirect_document_id": false
14394+
},
1439014395
{
1439114396
"source_path_from_root": "/articles/cognitive-services/QnAMaker/reference-data-guidelines.md",
1439214397
"redirect_url": "/azure/cognitive-services/QnAMaker/",
@@ -16124,8 +16129,13 @@
1612416129
},
1612516130
{
1612616131
"source_path_from_root": "/articles/lab-services/devtest-lab-add-artifact-repo.md",
16127-
"redirect_url": "/azure/devtest-labs/devtest-lab-add-artifact-repo",
16128-
"redirect_document_id": true
16132+
"redirect_url": "/azure/devtest-labs/add-artifact-repository",
16133+
"redirect_document_id": false
16134+
},
16135+
{
16136+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-add-artifact-repo.md",
16137+
"redirect_url": "/azure/devtest-labs/add-artifact-repository",
16138+
"redirect_document_id": false
1612916139
},
1613016140
{
1613116141
"source_path_from_root": "/articles/lab-services/devtest-lab-add-claimable-vm.md",
@@ -16572,6 +16582,11 @@
1657216582
"redirect_url": "/azure/devtest-labs/use-paas-services",
1657316583
"redirect_document_id": true
1657416584
},
16585+
{
16586+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-configure-use-public-environments.md",
16587+
"redirect_url": "/azure/devtest-labs/devtest-lab-create-environment-from-arm",
16588+
"redirect_document_id": false
16589+
},
1657516590
{
1657616591
"source_path_from_root": "/articles/dns/dns-getstarted-cli-nodejs.md",
1657716592
"redirect_url": "/azure/dns/dns-getstarted-cli",
@@ -21002,7 +21017,7 @@
2100221017
"redirect_url": "/azure/machine-learning/reference-yaml-job-pipeline",
2100321018
"redirect_document_id": false
2100421019
},
21005-
21020+
2100621021
{
2100721022
"source_path_from_root": "/articles/cognitive-services/QnAMaker/reference-precise-answering.md",
2100821023
"redirect_url": "/azure/cognitive-services/language/custom-question-answering/concepts/precise-answering",
@@ -43963,7 +43978,7 @@
4396343978
"redirect_url": "/azure/virtual-network/create-public-ip-prefix-portal",
4396443979
"redirect_document_id": true
4396543980
},
43966-
{
43981+
{
4396743982
"source_path_from_root": "/articles/machine-learning/algorithm-module-reference/add-columns.md",
4396843983
"redirect_url": "/azure/machine-learning/component-reference/add-columns",
4396943984
"redirect_document_id": true
@@ -44488,11 +44503,11 @@
4448844503
"redirect_url": "/azure/communication-services/concepts/telephony/port-phone-number",
4448944504
"redirect_document_id": false
4449044505
},
44491-
{
44492-
"source_path_from_root": "/articles/communication-services/quickstarts/voice-video-calling/pstn-call.md",
44493-
"redirect_url": "/azure/communication-services/quickstarts/telephony/pstn-call",
44494-
"redirect_document_id": false
44495-
},
44506+
{
44507+
"source_path_from_root": "/articles/communication-services/quickstarts/voice-video-calling/pstn-call.md",
44508+
"redirect_url": "/azure/communication-services/quickstarts/telephony/pstn-call",
44509+
"redirect_document_id": false
44510+
},
4449644511
{
4449744512
"source_path_from_root": "/articles/communication-services/concepts/telephony-sms/concepts.md",
4449844513
"redirect_url": "/azure/communication-services/concepts/sms/concepts",
@@ -45119,7 +45134,7 @@
4511945134
"redirect_document_id": false
4512045135
},
4512145136
{
45122-
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/quickstarts/try-sdk-rest-api.md",
45137+
"source_path_from_root": "/articles/applied-ai-services/form-recognizer/quickstarts/try-sdk-rest-api.md",
4512345138
"redirect_url": "/azure/applied-ai-services/form-recognizer/how-to-guides/try-sdk-rest-api",
4512445139
"redirect_document_id": false
4512545140
},
@@ -45147,6 +45162,11 @@
4514745162
"source_path_from_root": "/articles/networking/azure-orbital-overview.md",
4514845163
"redirect_url": "/azure/orbital/overview",
4514945164
"redirect_document_id": false
45165+
},
45166+
{
45167+
"source_path_from_root": "/articles/azure/sentinel/connect-windows-virtual-desktop.md",
45168+
"redirect_url": "/azure/sentinel/connect-azure-virtual-desktop",
45169+
"redirect_document_id": true
4515045170
}
4515145171
]
4515245172
}

articles/active-directory-b2c/identity-provider-generic-saml-options.md

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 08/25/2021
12+
ms.date: 01/13/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -242,6 +242,29 @@ The following example shows the `ForceAuthN` property in an authorization reques
242242
</samlp:AuthnRequest>
243243
```
244244

245+
### Provider name
246+
247+
You can optionally include the `ProviderName` attribute in the SAML authorization request. Set the metadata item as shown below to include the provider name for all requests to the external SAML IDP. The following example shows the `ProviderName` property set to `Contoso app`:
248+
249+
```xml
250+
<Metadata>
251+
...
252+
<Item Key="ProviderName">Contoso app</Item>
253+
...
254+
</Metadata>
255+
```
256+
257+
The following example shows the `ProviderName` property in an authorization request:
258+
259+
260+
```xml
261+
<samlp:AuthnRequest AssertionConsumerServiceURL="https://..." ...
262+
ProviderName="Contoso app">
263+
...
264+
</samlp:AuthnRequest>
265+
```
266+
267+
245268
### Include authentication context class references
246269

247270
A SAML authorization request may contain a **AuthnContext** element, which specifies the context of an authorization request. The element can contain an authentication context class reference, which tells the SAML identity provider which authentication mechanism to present to the user.

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,5 +111,6 @@ If you don't want to enable Azure AD Multi-Factor Authentication for all users,
111111

112112
* For more information on costs, see [Azure AD pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
113113
* [What is Conditional Access](../conditional-access/overview.md)
114+
* [What is Identity Protection?](../identity-protection/overview-identity-protection.md)
114115
* MFA can also be [enabled on a per-user basis](howto-mfa-userstates.md)
115116

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 08/20/2021
9+
ms.date: 01/12/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -27,7 +27,7 @@ The NPS extension acts as an adapter between RADIUS and cloud-based Azure AD Mul
2727
When you use the NPS extension for Azure AD Multi-Factor Authentication, the authentication flow includes the following components:
2828

2929
1. **NAS/VPN Server** receives requests from VPN clients and converts them into RADIUS requests to NPS servers.
30-
2. **NPS Server** connects to Active Directory Domain Services (AD DS) to perform the primary authentication for the RADIUS requests and, upon success, passes the request to any installed extensions.  
30+
2. **NPS Server** connects to Active Directory Domain Services (AD DS) to perform the primary authentication for the RADIUS requests and, upon success, passes the request to any installed extensions.
3131
3. **NPS Extension** triggers a request to Azure AD Multi-Factor Authentication for the secondary authentication. Once the extension receives the response, and if the MFA challenge succeeds, it completes the authentication request by providing the NPS server with security tokens that include an MFA claim, issued by Azure STS.
3232
>[!NOTE]
3333
>Users must have access to their default authentication method to complete the MFA requirement. They cannot choose an alternative method. Their default authentication method will be used even if it's been disabled in the tenant authentication methods and MFA policies.
@@ -160,6 +160,9 @@ There are two factors that affect which authentication methods are available wit
160160
> When you deploy the NPS extension, use these factors to evaluate which methods are available for your users. If your RADIUS client supports PAP, but the client UX doesn't have input fields for a verification code, then phone call and mobile app notification are the two supported options.
161161
>
162162
> Also, regardless of the authentication protocol that's used (PAP, CHAP, or EAP), if your MFA method is text-based (SMS, mobile app verification code, or OATH hardware token) and requires the user to enter a code or text in the VPN client UI input field, the authentication might succeed. *But* any RADIUS attributes that are configured in the Network Access Policy are *not* forwarded to the RADIUS client (the Network Access Device, like the VPN gateway). As a result, the VPN client might have more access than you want it to have, or less access or no access.
163+
>
164+
> As a workaround, you can run the [CrpUsernameStuffing script](https://github.com/OneMoreNate/CrpUsernameStuffing) to forward RADIUS attributes that are configured in the Network Access Policy and allow MFA when the user's authentication method requires the use of a One-Time Passcode (OTP), such as SMS, a Microsoft Authenticator passcode, or a hardware FOB.
165+
163166

164167
* The input methods that the client application (VPN, Netscaler server, or other) can handle. For example, does the VPN client have some means to allow the user to type in a verification code from a text or mobile app?
165168

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Exchange Online, SharePoint Online, Teams, and MS Graph can synchronize key Cond
5959
This process enables the scenario where users lose access to organizational files, email, calendar, or tasks from Microsoft 365 client apps or SharePoint Online immediately after network location changes.
6060

6161
> [!NOTE]
62-
> Not all app and resource provider combination are supported. See table below. Office refers to Word, Excel, and PowerPoint.
62+
> Not all client app and resource provider combinations are supported. See table below. The first column of this table refers to web applications launched via web browser (i.e. PowerPoint launched in web browser) while the remaining four columns refer to native applications running on each platform described. Additionally, references to "Office" encompass Word, Excel, and PowerPoint.
6363
6464
| | Outlook Web | Outlook Win32 | Outlook iOS | Outlook Android | Outlook Mac |
6565
| :--- | :---: | :---: | :---: | :---: | :---: |

0 commit comments

Comments
 (0)