Skip to content

Commit d2f2356

Browse files
authored
Merge pull request #49173 from MicrosoftDocs/master
8/16 AM Publish
2 parents 744747d + 2738dcb commit d2f2356

File tree

133 files changed

+3990
-1879
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

133 files changed

+3990
-1879
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26421,6 +26421,11 @@
2642126421
"redirect_url": "/azure/azure-stack/user/azure-stack-create-vm-template",
2642226422
"redirect_document_id": false
2642326423
},
26424+
{
26425+
"source_path": "articles/azure-stack/user/azure-stack-powershell-download.md",
26426+
"redirect_url": "/azure/azure-stack/azure-stack-powershell-download",
26427+
"redirect_document_id": false
26428+
},
2642426429
{
2642526430
"source_path": "articles/active-directory/application-proxy-teams.md",
2642626431
"redirect_url": "/azure/active-directory/manage-apps/application-proxy-integrate-with-teams",

articles/active-directory-b2c/active-directory-b2c-setup-aad-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 04/04/2017
11+
ms.date: 08/15/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -109,7 +109,7 @@ You can define Azure AD as a claims provider by adding Azure AD to the `<ClaimsP
109109
<OutputClaim ClaimTypeReferenceId="givenName" PartnerClaimType="given_name" />
110110
<OutputClaim ClaimTypeReferenceId="surName" PartnerClaimType="family_name" />
111111
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="name" />
112-
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="contosoAuthentication" />
112+
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication" />
113113
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="AzureADContoso" />
114114
</OutputClaims>
115115
<OutputClaimsTransformations>

articles/active-directory-b2c/active-directory-b2c-setup-sf-app-custom.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: mtillman
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 06/11/2017
11+
ms.date: 08/15/2018
1212
ms.author: davidmu
1313
ms.component: B2C
1414
---
@@ -146,7 +146,7 @@ You need to define Salesforce as a claims provider so users can sign in by using
146146
<OutputClaim ClaimTypeReferenceId="surname" PartnerClaimType="family_name"/>
147147
<OutputClaim ClaimTypeReferenceId="email" PartnerClaimType="email"/>
148148
<OutputClaim ClaimTypeReferenceId="displayName" PartnerClaimType="username"/>
149-
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="externalIdp"/>
149+
<OutputClaim ClaimTypeReferenceId="authenticationSource" DefaultValue="socialIdpAuthentication"/>
150150
<OutputClaim ClaimTypeReferenceId="identityProvider" DefaultValue="SAMLIdp" />
151151
</OutputClaims>
152152
<OutputClaimsTransformations>

articles/active-directory/TOC.md

Lines changed: 0 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -400,34 +400,6 @@
400400
### [Retrieve access review results](active-directory-azure-ad-controls-retrieve-access-review.md)
401401

402402
## Secure your identities
403-
### Conditional access
404-
#### [Overview](conditional-access/overview.md)
405-
#### Quickstarts
406-
##### [Require MFA for specific apps](conditional-access/app-based-mfa.md)
407-
##### [Require terms of use to be accepted](conditional-access/require-tou.md)
408-
##### [Block access when a session risk is detected](conditional-access/app-sign-in-risk.md)
409-
#### Tutorials
410-
##### [Migrate classic MFA policy](conditional-access/policy-migration-mfa.md)
411-
#### Concepts
412-
##### [Baseline Protection](conditional-access/baseline-protection.md)
413-
##### [Conditions](conditional-access/conditions.md)
414-
##### [Location conditions](conditional-access/location-condition.md)
415-
##### [Controls](conditional-access/controls.md)
416-
##### [What if tool](conditional-access/what-if-tool.md)
417-
#### How-to guides
418-
##### [Best practices](conditional-access/best-practices.md)
419-
##### [Require MFA for access attempts from untrusted networks](conditional-access/untrusted-networks.md)
420-
##### [Require managed devices](conditional-access/require-managed-devices.md)
421-
##### [Require approved client apps](conditional-access/app-based-conditional-access.md)
422-
##### [Require terms of use for users and apps](active-directory-tou.md)
423-
##### [Migrate classic policies](conditional-access/policy-migration.md)
424-
##### [Set up VPN connectivity](https://docs.microsoft.com/windows-server/remote/remote-access/vpn/always-on-vpn/deploy/always-on-vpn-deploy)
425-
##### [Set up SharePoint and Exchange Online](conditional-access/conditional-access-for-exo-and-spo.md)
426-
##### [Remediation](active-directory-conditional-access-device-remediation.md)
427-
#### [Reference](conditional-access/technical-reference.md)
428-
##### [Technical reference](conditional-access/technical-reference.md)
429-
#### [FAQs](conditional-access/faqs.md)
430-
431403
### Certificate-based Authentication
432404
#### [Android](active-directory-certificate-based-authentication-android.md)
433405
#### [iOS](active-directory-certificate-based-authentication-ios.md)
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
- name: Conditional Access Documentation
2+
href: index.yml
3+
- name: Overview
4+
items:
5+
- name: What is conditional access?
6+
href: overview.md
7+
- name: Quickstarts
8+
items:
9+
- name: Require MFA for specific apps
10+
href: app-based-mfa.md
11+
- name: Require terms of use to be accepted
12+
href: require-tou.md
13+
- name: Block access when a session risk is detected
14+
href: app-sign-in-risk.md
15+
- name: Tutorials
16+
items:
17+
- name: Migrate classic MFA policies
18+
href: policy-migration-mfa.md
19+
- name: Concepts
20+
expanded: false
21+
items:
22+
- name: Baseline Protection
23+
href: baseline-protection.md
24+
- name: Conditions
25+
href: conditions.md
26+
- name: Location conditions
27+
href: location-condition.md
28+
- name: Controls
29+
href: controls.md
30+
- name: What if tool
31+
href: what-if-tool.md
32+
- name: How-to guides
33+
expanded: true
34+
items:
35+
- name: Best practices
36+
href: best-practices.md
37+
- name: Require MFA for access attempts from untrusted networks
38+
href: untrusted-networks.md
39+
- name: Require managed devices
40+
href: require-managed-devices.md
41+
- name: Require approved client apps
42+
href: app-based-conditional-access.md
43+
- name: Control access to Exchange Online and SharePoint Online
44+
href: conditional-access-for-exo-and-spo.md
45+
- name: Migrate classic policies
46+
href: policy-migration.md
47+
- name: Reference
48+
items:
49+
- name: Technical reference
50+
href: technical-reference.md
51+
- name: Resources
52+
items:
53+
- name: Azure feedback forum
54+
href: https://feedback.azure.com/forums/169401-azure-active-directory
55+
- name: MSDN forum
56+
href: https://social.msdn.microsoft.com/Forums/azure/home?forum=WindowsAzureAD
57+
- name: Pricing
58+
href: https://azure.microsoft.com/pricing/details/active-directory/
59+
- name: Service updates
60+
href: ../fundamentals/whats-new.md
61+
- name: Stack Overflow
62+
href: http://stackoverflow.com/questions/tagged/azure-active-directory
63+
- name: Videos
64+
href: https://azure.microsoft.com/documentation/videos/index/?services=active-directory
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
### YamlMime:YamlDocument
2+
documentType: LandingData
3+
title: Azure AD Conditional Access Documentation
4+
metadata:
5+
document_id:
6+
title: Azure Active Directory Conditional Access Documentation - Tutorials, quickstarts, concepts, references | Microsoft Docs
7+
description: Learn how to configure and test Azure Active Directory conditional access.
8+
services: active-directory
9+
ms.component: authentication
10+
author: MarkusVi
11+
manager: mtillman
12+
ms.service: active-directory
13+
ms.tgt_pltfrm: na
14+
ms.devlang: na
15+
ms.topic: landing-page
16+
ms.date: 08/14/2018
17+
ms.author: markvi
18+
abstract:
19+
description: "Learn how to master the balance between security and productivity by configuring Azure AD conditional access.
20+
With conditional access policies, you can factor how your cloud apps are accessed into your access decisions.
21+
For example, you can address in your access decisions the following questions:<ul><li>What is the user&#39;s network location?</li><li>Has the access attempt be initiated from a managed device?</li><li>From which client app has a connection attempt been initiated?</li><li>Has an access attempt been made from a risky sign-in?</li></ul>The following resources help you to quickly get started."
22+
aside:
23+
image:
24+
alt:
25+
height: 110
26+
src: ./media/index/video.png
27+
width: 246
28+
title: Conditional access explained
29+
href: https://www.youtube.com/watch?v=A7IrxAH87wc
30+
width: 246
31+
sections:
32+
- title: 5-minute quickstarts
33+
items:
34+
- type: paragraph
35+
text: 'Learn how to configure conditional access policies for common access scenarios.'
36+
- type: list
37+
style: icon48
38+
items:
39+
- image:
40+
src: ./media/index/i_security-management.png
41+
text: Require MFA for specific apps
42+
href: app-based-mfa.md
43+
- image:
44+
src: ./media/index/i_security-management.png
45+
text: Block access when a session risk is detected
46+
href: app-sign-in-risk.md
47+
- image:
48+
src: ./media/index/i_security-management.png
49+
text: Require terms of use to be accepted
50+
href: require-tou.md
51+
- title: Step-by-Step Tutorials
52+
items:
53+
- type: paragraph
54+
text: Learn how to migrate your classic conditional access policies.
55+
- type: list
56+
style: unordered
57+
items:
58+
- html: <a href="/azure/active-directory/conditional-access/policy-migration-mfa">Migrate a classic policy that requires multi-factor authentication</a>
2.23 KB
Loading
51 KB
Loading

articles/active-directory/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.service: active-directory
1111
ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: landing-page
14-
ms.date: 04/13/2018
14+
ms.date: 08/16/2018
1515
ms.author: mtillman
1616
experimental: true
1717
experiment_id: "50f26fb6-3aa0-42"
@@ -98,7 +98,7 @@ Azure Active Directory (Azure AD) is a multi-tenant, cloud-based directory and i
9898
<h3>Protection</h3>
9999
<p>
100100
<a href="/azure/active-directory/active-directory-identityprotection">Identity protection</a><br/>
101-
<a href="/azure/active-directory/active-directory-conditional-access-azure-portal">Conditional access</a><br/>
101+
<a href="/azure/active-directory/conditional-access/index">Conditional access</a><br/>
102102
<a href="/azure/active-directory/privileged-identity-management/pim-configure">Privileged identity management</a>
103103
</p>
104104
</div>

articles/active-directory/managed-service-identity/qs-configure-cli-windows-vm.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,11 @@ In this article, you learn how to perform the following Managed Service Identity
3838
- To run the CLI script examples, you have three options:
3939
- Use [Azure Cloud Shell](../../cloud-shell/overview.md) from the Azure portal (see next section).
4040
- Use the embedded Azure Cloud Shell via the "Try It" button, located in the top right corner of each code block.
41-
- [Install the latest version of CLI 2.0](https://docs.microsoft.com/cli/azure/install-azure-cli) (2.0.13 or later) if you prefer to use a local CLI console.
41+
- [Install the latest version of Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli) if you prefer to use a local CLI console.
42+
43+
> [!NOTE]
44+
> The commands have been updated to reflect the latest release of the [Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli).
45+
4246

4347
[!INCLUDE [cloud-shell-try-it.md](../../../includes/cloud-shell-try-it.md)]
4448

@@ -84,7 +88,7 @@ If you need to enable the system assigned identity on an existing VM:
8488
az vm identity assign -g myResourceGroup -n myVm
8589
```
8690

87-
### Disable the system assigned identity from an Azure VM
91+
### Disable system assigned identity from an Azure VM
8892

8993
If you have a Virtual Machine that no longer needs the system assigned identity, but still needs user assigned identities, use the following command:
9094

@@ -136,7 +140,7 @@ This section walks you through creation of a VM with assignment of a user assign
136140
"clientSecretUrl": "https://control-westcentralus.identity.azure.net/subscriptions/<SUBSCRIPTON ID>/resourcegroups/<RESOURCE GROUP>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<MSI NAME>/credentials?tid=5678&oid=9012&aid=73444643-8088-4d70-9532-c3a0fdc190fz",
137141
"id": "/subscriptions/<SUBSCRIPTON ID>/resourcegroups/<RESOURCE GROUP>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<MSI NAME>",
138142
"location": "westcentralus",
139-
"name": "<MSI NAME>",
143+
"name": "<USER ASSIGNED IDENTITY NAME>",
140144
"principalId": "e5fdfdc1-ed84-4d48-8551-fe9fb9dedfll",
141145
"resourceGroup": "<RESOURCE GROUP>",
142146
"tags": {},
@@ -145,10 +149,10 @@ This section walks you through creation of a VM with assignment of a user assign
145149
}
146150
```
147151

148-
3. Create a VM using [az vm create](/cli/azure/vm/#az-vm-create). The following example creates a VM associated with the new user assigned identity, as specified by the `--assign-identity` parameter. Be sure to replace the `<RESOURCE GROUP>`, `<VM NAME>`, `<USER NAME>`, `<PASSWORD>`, and `<MSI ID>` parameter values with your own values. For `<MSI ID>`, use the user assigned identity's resource `id` property created in the previous step:
152+
3. Create a VM using [az vm create](/cli/azure/vm/#az-vm-create). The following example creates a VM associated with the new user assigned identity, as specified by the `--assign-identity` parameter. Be sure to replace the `<RESOURCE GROUP>`, `<VM NAME>`, `<USER NAME>`, `<PASSWORD>`, and `<USER ASSIGNED IDENTITY NAME>` parameter values with your own values.
149153

150154
```azurecli-interactive
151-
az vm create --resource-group <RESOURCE GROUP> --name <VM NAME> --image UbuntuLTS --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <MSI ID>
155+
az vm create --resource-group <RESOURCE GROUP> --name <VM NAME> --image UbuntuLTS --admin-username <USER NAME> --admin-password <PASSWORD> --assign-identity <USER ASSIGNED IDENTITY NAME>
152156
```
153157

154158
### Assign a user assigned identity to an existing Azure VM
@@ -161,7 +165,7 @@ This section walks you through creation of a VM with assignment of a user assign
161165
```azurecli-interactive
162166
az identity create -g <RESOURCE GROUP> -n <MSI NAME>
163167
```
164-
The response contains details for the user assigned managed identity created, similar to the following. The resource `id` value assigned to the user assigned identity is used in the following step.
168+
The response contains details for the user assigned managed identity created, similar to the following.
165169
166170
```json
167171
{
@@ -178,18 +182,18 @@ The response contains details for the user assigned managed identity created, si
178182
}
179183
```
180184

181-
2. Assign the user assigned identity to your VM using [az vm identity assign](/cli/azure/vm#az-vm-identity-assign). Be sure to replace the `<RESOURCE GROUP>` and `<VM NAME>` parameter values with your own values. The `<MSI ID>` will be the user assigned identity's resource `id` property, as created in the previous step:
185+
2. Assign the user assigned identity to your VM using [az vm identity assign](/cli/azure/vm#az-vm-identity-assign). Be sure to replace the `<RESOURCE GROUP>` and `<VM NAME>` parameter values with your own values. The `<USER ASSIGNED IDENTITY>` is the user assigned identity's resource `name` property, as created in the previous step:
182186

183187
```azurecli-interactive
184-
az vm identity assign -g <RESOURCE GROUP> -n <VM NAME> --identities <MSI ID>
188+
az vm identity assign -g <RESOURCE GROUP> -n <VM NAME> --identities <USER ASSIGNED IDENTITY>
185189
```
186190
187191
### Remove a user assigned identity from an Azure VM
188192
189-
To remove a user assigned identity from a VM use [az vm identity remove](/cli/azure/vm#az-vm-identity-remove). Be sure to replace the `<RESOURCE GROUP>` and `<VM NAME>` parameter values with your own values. The `<MSI NAME>` will be the user assigned identity's `name` property, which can be found by in the identity section of the VM using `az vm identity show`:
193+
To remove a user assigned identity from a VM use [az vm identity remove](/cli/azure/vm#az-vm-identity-remove). If this is the only user assigned identity assigned to the virtual machine, `UserAssigned` will be removed from the identity type value. Be sure to replace the `<RESOURCE GROUP>` and `<VM NAME>` parameter values with your own values. The `<USER ASSIGNED IDENTITY>` will be the user assigned identity's `name` property, which can be found in the identity section of the virtual machine using `az vm identity show`:
190194
191195
```azurecli-interactive
192-
az vm identity remove -g <RESOURCE GROUP> -n <VM NAME> --identities <MSI NAME>
196+
az vm identity remove -g <RESOURCE GROUP> -n <VM NAME> --identities <USER ASSIGNED IDENTITY>
193197
```
194198

195199
If your VM does not have a system assigned identity and you want to remove all user assigned identities from it, use the following command:
@@ -198,13 +202,13 @@ If your VM does not have a system assigned identity and you want to remove all u
198202
> The value `none` is case sensitive. It must be lowercase.
199203
200204
```azurecli-interactive
201-
az vm update -n myVM -g myResourceGroup --set identity.type="none" identity.identityIds=null
205+
az vm update -n myVM -g myResourceGroup --set identity.type="none" identity.userAssignedIdentities=null
202206
```
203207

204208
If your VM has both system assigned and user assigned identities, you can remove all the user assigned identities by switching to use only system assigned. Use the following command:
205209

206210
```azurecli-interactive
207-
az vm update -n myVM -g myResourceGroup --set identity.type='SystemAssigned' identity.identityIds=null
211+
az vm update -n myVM -g myResourceGroup --set identity.type='SystemAssigned' identity.userAssignedIdentities=null
208212
```
209213

210214
## Related content

0 commit comments

Comments
 (0)