Skip to content

Commit d1b51ba

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-b2c-prefix-removal
2 parents 26362e7 + c1d8160 commit d1b51ba

File tree

151 files changed

+1578
-1878
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

151 files changed

+1578
-1878
lines changed

.openpublishing.redirection.json

Lines changed: 66 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28846,6 +28846,11 @@
2884628846
"redirect_url": "/azure/hdinsight/domain-joined/apache-domain-joined-configure-using-azure-adds",
2884728847
"redirect_document_id": false
2884828848
},
28849+
{
28850+
"source_path": "articles/hdinsight/domain-joined/domain-joined-zeppelin-signin.md",
28851+
"redirect_url": "/azure/hdinsight/domain-joined/hdinsight-security-overview",
28852+
"redirect_document_id": false
28853+
},
2884928854
{
2885028855
"source_path": "articles/hdinsight/hdinsight-domain-joined-introduction.md",
2885128856
"redirect_url": "/azure/hdinsight/domain-joined/apache-domain-joined-introduction",
@@ -34208,7 +34213,17 @@
3420834213
},
3420934214
{
3421034215
"source_path": "articles/cognitive-services/entitylinking/index.md",
34211-
"redirect_url": "/azure/cognitive-services/entitylinking/home",
34216+
"redirect_url": "/azure/cognitive-services/text-analytics",
34217+
"redirect_document_id": false
34218+
},
34219+
{
34220+
"source_path": "articles/cognitive-services/entitylinking/GettingStarted.md",
34221+
"redirect_url": "/azure/cognitive-services/text-analytics",
34222+
"redirect_document_id": false
34223+
},
34224+
{
34225+
"source_path": "articles/cognitive-services/entitylinking/Home.md",
34226+
"redirect_url": "/azure/cognitive-services/text-analytics",
3421234227
"redirect_document_id": false
3421334228
},
3421434229
{
@@ -34221,6 +34236,41 @@
3422134236
"redirect_url": "/azure/cognitive-services/LinguisticAnalysisAPI/Home",
3422234237
"redirect_document_id": false
3422334238
},
34239+
{
34240+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/AnalyzeMethod.md",
34241+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
34242+
"redirect_document_id": false
34243+
},
34244+
{
34245+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/Analyzer-Names.md",
34246+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
34247+
"redirect_document_id": false
34248+
},
34249+
{
34250+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/AnalyzersMethod.md",
34251+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
34252+
"redirect_document_id": false
34253+
},
34254+
{
34255+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/Constituency-Parsing.md",
34256+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
34257+
"redirect_document_id": false
34258+
},
34259+
{
34260+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/Home.md",
34261+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
34262+
"redirect_document_id": false
34263+
},
34264+
{
34265+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/POS-tagging.md",
34266+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
34267+
"redirect_document_id": false
34268+
},
34269+
{
34270+
"source_path": "articles/cognitive-services/LinguisticAnalysisAPI/Sentences-and-Tokens.md",
34271+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
34272+
"redirect_document_id": false
34273+
},
3422434274
{
3422534275
"source_path": "articles/cognitive-services/Recommendations/index.md",
3422634276
"redirect_url": "/azure/cognitive-services/Recommendations/overview",
@@ -34236,6 +34286,11 @@
3423634286
"redirect_url": "/azure/cognitive-services/Web-Language-Model/Home",
3423734287
"redirect_document_id": false
3423834288
},
34289+
{
34290+
"source_path": "articles/cognitive-services/Web-Language-Model/Home.md",
34291+
"redirect_url": "/azure/machine-learning/studio-module-reference/text-analytics",
34292+
"redirect_document_id": false
34293+
},
3423934294
{
3424034295
"source_path": "articles/data-factory/v1/index.md",
3424134296
"redirect_url": "/azure/data-factory/v1/data-factory-introduction",
@@ -45520,6 +45575,16 @@
4552045575
"redirect_url": "/azure/storage/common/storage-security-guide",
4552145576
"redirect_document_id": false
4552245577
},
45578+
{
45579+
"source_path": "articles/storage/blobs/data-lake-storage-quickstart-create-account.md",
45580+
"redirect_url": "/azure/storage/common/storage-account-create",
45581+
"redirect_document_id": false
45582+
},
45583+
{
45584+
"source_path": "articles/storage/blobs/data-lake-storage-how-to-set-permissions-storage-explorer.md",
45585+
"redirect_url": "/azure/storage/blobs/data-lake-storage-explorer",
45586+
"redirect_document_id": false
45587+
},
4552345588
{
4552445589
"source_path": "articles/security/fundamentals/global-admin.md",
4552545590
"redirect_url": "/azure/active-directory/authentication/multi-factor-authentication",

articles/active-directory-b2c/faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In an Azure AD tenant, users that belong to the tenant sign-in with an email add
3535

3636
In an Azure AD B2C tenant, most apps want the user to sign-in with any arbitrary email address (for example, [email protected], [email protected], [email protected], or [email protected]). This type of account is a local account. We also support arbitrary user names as local accounts (for example, joe, bob, sarah, or jim). You can choose one of these two local account types when configuring identity providers for Azure AD B2C in the Azure portal. In your Azure AD B2C tenant, select **Identity providers**, select **Local account**, and then select **Username**.
3737

38-
User accounts for applications must always be created through a sign-up user flow, sign-up or sign-in user flow, or by using the Azure AD Graph API. User accounts created in the Azure portal are only used for administering the tenant.
38+
User accounts for applications can be created through a sign-up user flow, sign-up or sign-in user flow, the Microsoft Graph API, or in the Azure portal.
3939

4040
### Which social identity providers do you support now? Which ones do you plan to support in the future?
4141

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Azure Active Directory passwordless sign in (preview)
3-
description: Passwordless sign in to Azure AD using FIDO2 security keys or the Microsoft Authenticator app (preview)
3+
description: Learn about options for passwordless sign in to Azure Active Directory using FIDO2 security keys or the Microsoft Authenticator app
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/08/2019
9+
ms.date: 01/24/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Passwordless authentication options
1919

20-
Multi-factor authentication (MFA) is a great way to secure your organization, but users get frustrated with the additional layer on top of having to remember their passwords. Passwordless authentication methods are more convenient because the password is removed and replaced with something you have plus something you are or something you know.
20+
Multi-factor authentication (MFA) is a great way to secure your organization, but users often get frustrated with the additional security layer on top of having to remember their passwords. Passwordless authentication methods are more convenient because the password is removed and replaced with something you have, plus something you are or something you know.
2121

2222
| | Something you have | Something you are or know |
2323
| --- | --- | --- |
@@ -33,23 +33,23 @@ Each organization has different needs when it comes to authentication. Microsoft
3333

3434
## Windows Hello for Business
3535

36-
Windows Hello for Business is ideal for information workers who have their own designated Windows PC. The biometric and PIN are directly tied to the user's PC, which prevents access from anyone other than the owner. With PKI integration and built-in support for single sign-on (SSO), Windows Hello for Business provides a simple and convenient method for seamlessly accessing corporate resources on-premises and in the cloud.
36+
Windows Hello for Business is ideal for information workers who have their own designated Windows PC. The biometric and PIN are directly tied to the user's PC, which prevents access from anyone other than the owner. With public key infrastructure (PKI) integration and built-in support for single sign-on (SSO), Windows Hello for Business provides a convenient method for seamlessly accessing corporate resources on-premises and in the cloud.
3737

3838
The Windows Hello for Business [planning guide](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-planning-guide) can be used to help you make decisions on the type of Windows Hello for Business deployment and the options you'll need to consider.
3939

4040
## Microsoft Authenticator App
4141

42-
Allow your employees phone to become a passwordless authentication method. You may already be using the Microsoft Authenticator App as a convenient multi-factor authentication option in addition to a password. But now, it’s available as a passwordless option.
42+
Allow your employee's phone to become a passwordless authentication method. You may already be using the Microsoft Authenticator App as a convenient multi-factor authentication option in addition to a password. You can also use the Authenticator App as a passwordless option.
4343

4444
![Sign in to Microsoft Edge with the Microsoft Authenticator app](./media/concept-authentication-passwordless/concept-web-sign-in-microsoft-authenticator-app.png)
4545

46-
It turns any iOS or Android phone into a strong, passwordless credential by allowing users to sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone and then using their biometric (touch or face) or PIN to confirm.
46+
The Authenticator App turns any iOS or Android phone into a strong, passwordless credential. Users can sign in to any platform or browser by getting a notification to their phone, matching a number displayed on the screen to the one on their phone, and then using their biometric (touch or face) or PIN to confirm.
4747

4848
## FIDO2 security keys
4949

50-
FIDO2 security keys are an unphishable standards-based passwordless authentication method that can come in any form factor. Fast Identity Online (FIDO) is an open standard for passwordless authentication. It allows users and organizations to leverage the standard to sign in to their resources without a username or password using an external security key or a platform key built into a device.
50+
FIDO2 security keys are an unphishable standards-based passwordless authentication method that can come in any form factor. Fast Identity Online (FIDO) is an open standard for passwordless authentication. FIDO allows users and organizations to leverage the standard to sign in to their resources without a username or password using an external security key or a platform key built into a device.
5151

52-
For public preview, employees can use security keys to sign in to their Azure AD joined Windows 10 devices and get single-sign on to their cloud and on-premises resources. They can also sign in to supported browsers.
52+
For public preview, employees can use security keys to sign in to their Azure AD-joined Windows 10 devices and get single-sign on to their cloud and on-premises resources. Users can also sign in to supported browsers. FIDO2 security keys are a great option for enterprises who are very security sensitive or have scenarios or employees who aren't willing or able to use their phone as a second factor.
5353

5454
![Sign in to Microsoft Edge with a security key](./media/concept-authentication-passwordless/concept-web-sign-in-security-key.png)
5555

@@ -64,7 +64,7 @@ A security key **MUST** implement the following features and extensions from the
6464
| 3 | hmac-secret | This extension ensures you can sign in to your device when it's off-line or in airplane mode. |
6565
| 4 | Multiple accounts per RP | This feature ensures you can use the same security key across multiple services like Microsoft Account and Azure Active Directory. |
6666

67-
The following providers offer FIDO2 security keys of different form factors that are known to be compatible with the passwordless experience. Microsoft encourages customers to evaluate the security properties of these keys by contacting the vendor as well as FIDO Alliance.
67+
The following providers offer FIDO2 security keys of different form factors that are known to be compatible with the passwordless experience. We encourage you to evaluate the security properties of these keys by contacting the vendor as well as FIDO Alliance.
6868

6969
| Provider | Contact |
7070
| --- | --- |
@@ -76,20 +76,18 @@ The following providers offer FIDO2 security keys of different form factors that
7676
| AuthenTrend | [https://authentrend.com/about-us/#pg-35-3](https://authentrend.com/about-us/#pg-35-3) |
7777

7878
> [!NOTE]
79-
> If you purchase and plan to use NFC based security keys you will need a supported NFC reader.
79+
> If you purchase and plan to use NFC-based security keys, you need a supported NFC reader for the security key. The NFC reader isn't an Azure requirement or limitation. Check with the vendor for your NFC-based security key for a list of supported NFC readers.
8080
81-
If you are a vendor and want to get your device on this list, contact [[email protected]](mailto:[email protected]).
82-
83-
FIDO2 security keys are a great option for enterprises who are very security sensitive or have scenarios or employees who aren’t willing or able to use their phone as a second factor.
81+
If you're a vendor and want to get your device on this list of supported devices, contact [[email protected]](mailto:[email protected]).
8482

8583
## What scenarios work with the preview?
8684

8785
- Administrators can enable passwordless authentication methods for their tenant
8886
- Administrators can target all users or select users/groups within their tenant for each method
8987
- End users can register and manage these passwordless authentication methods in their account portal
9088
- End users can sign in with these passwordless authentication methods
91-
- Microsoft Authenticator App: Will work in scenarios where Azure AD authentication is used, including across all browsers, during Windows 10 Out Of Box (OOBE) setup, and with integrated mobile apps on any operating system.
92-
- Security keys: Will work on lock screen for Windows 10 and the web in supported browsers like Microsoft Edge.
89+
- Microsoft Authenticator App: Works in scenarios where Azure AD authentication is used, including across all browsers, during Windows 10 Out Of Box (OOBE) setup, and with integrated mobile apps on any operating system.
90+
- Security keys: Work on lock screen for Windows 10 and the web in supported browsers like Microsoft Edge.
9391

9492
## Next steps
9593

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,8 @@ This version fixes a bug where some servers that were auto-upgraded from a previ
8080

8181
Under certain circumstances, servers that were auto upgraded to version 1.4.18.0 did not re-enable Self-service password reset and Password Writeback after the upgrade was completed. This auto upgrade release fixes that issue and re-enables Self-service password reset and Password Writeback.
8282

83+
We fixed a bug in the sync errors compression utility that was not handling surrogate characters correctly.
84+
8385
## 1.4.18.0
8486

8587
>[!WARNING]

0 commit comments

Comments
 (0)