Skip to content

Commit d340f4c

Browse files
Merge branch 'main' into v-ssaunders-YinglueZhang-MS
2 parents 32fec1b + 54e36a8 commit d340f4c

File tree

966 files changed

+41336
-15697
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

966 files changed

+41336
-15697
lines changed

.openpublishing.redirection.healthcare-apis.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -491,6 +491,41 @@
491491
"source_path_from_root": "/articles/healthcare-apis/fhir/bulk-importing-fhir-data.md",
492492
"redirect_url": "/azure/healthcare-apis/fhir/configure-import-data",
493493
"redirect_document_id": true
494+
},
495+
{
496+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-azure-resource-manager-template-quickstart.md",
497+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
498+
"redirect_document_id": false
499+
},
500+
{
501+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-data-flow.md",
502+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
503+
"redirect_document_id": false
504+
},
505+
{
506+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-fhir-portal-quickstart.md",
507+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
508+
"redirect_document_id": false
509+
},
510+
{
511+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-mapping-templates.md",
512+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
513+
"redirect_document_id": false
514+
},
515+
{
516+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-metrics-diagnostics-export.md",
517+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
518+
"redirect_document_id": false
519+
},
520+
{
521+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-metrics-display.md",
522+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
523+
"redirect_document_id": false
524+
},
525+
{
526+
"source_path_from_root": "/articles/healthcare-apis/azure-api-for-fhir/iot-troubleshoot-guide.md",
527+
"redirect_url": "/azure/healthcare-apis/iot/iot-connector-overview",
528+
"redirect_document_id": false
494529
}
495530
]
496531
}

.openpublishing.redirection.json

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6308,6 +6308,21 @@
63086308
"redirect_url": "/azure/storage/blobs/storage-auth-abac",
63096309
"redirect_document_id": false
63106310
},
6311+
{
6312+
"source_path": "articles/storage/blobs/reference.md",
6313+
"redirect_url": "/azure/storage/blobs/storage-blobs-introduction",
6314+
"redirect_document_id": false
6315+
},
6316+
{
6317+
"source_path": "articles/storage/queues/reference.md",
6318+
"redirect_url": "/azure/storage/queues/storage-queues-introduction",
6319+
"redirect_document_id": false
6320+
},
6321+
{
6322+
"source_path": "articles/storage/files/reference.md",
6323+
"redirect_url": "/azure/storage/files/storage-files-introduction",
6324+
"redirect_document_id": false
6325+
},
63116326
{
63126327
"source_path_from_root": "/articles/storage/storage-client-side-encryption.md",
63136328
"redirect_url": "/azure/storage/common/storage-client-side-encryption",
@@ -21271,12 +21286,12 @@
2127121286
{
2127221287
"source_path_from_root": "/articles/storage/vs-storage-cloud-services-getting-started-queues.md",
2127321288
"redirect_url": "/azure/visual-studio/vs-storage-cloud-services-getting-started-queues",
21274-
"redirect_document_id": true
21289+
"redirect_document_id": false
2127521290
},
2127621291
{
2127721292
"source_path_from_root": "/articles/storage/vs-storage-cloud-services-getting-started-tables.md",
2127821293
"redirect_url": "/azure/visual-studio/vs-storage-cloud-services-getting-started-tables",
21279-
"redirect_document_id": true
21294+
"redirect_document_id": false
2128021295
},
2128121296
{
2128221297
"source_path_from_root": "/articles/storage/vs-storage-cloud-services-what-happened.md",

articles/active-directory-domain-services/powershell-create-instance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ $replicaSetParams = @{
209209
Location = $AzureLocation
210210
SubnetId = "/subscriptions/$AzureSubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.Network/virtualNetworks/$VnetName/subnets/DomainServices"
211211
}
212-
$replicaSet = New-AzADDomainServiceReplicaSet @replicaSetParams
212+
$replicaSet = New-AzADDomainServiceReplicaSetObject @replicaSetParams
213213
214214
$domainServiceParams = @{
215215
Name = $ManagedDomainName

articles/active-directory/app-provisioning/accidental-deletions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,12 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 09/27/2021
11+
ms.date: 09/30/2022
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
1515

16-
# Enable accidental deletions prevention in the Azure AD provisioning service (Preview)
16+
# Enable accidental deletions prevention in the Azure AD provisioning service
1717

1818
The Azure AD provisioning service includes a feature to help avoid accidental deletions. This feature ensures that users aren't disabled or deleted in an application unexpectedly.
1919

@@ -32,7 +32,7 @@ threshold. Also, be sure the notification email address is completed. If the del
3232
When the deletion threshold is met, the job will go into quarantine and a notification email will be sent. The quarantined job can then be allowed or rejected. To learn more about quarantine behavior, see [Application provisioning in quarantine status](application-provisioning-quarantine-status.md).
3333

3434
## Recovering from an accidental deletion
35-
If you encounter an accidental deletion you'll see it on the provisioning status page. It will say **Provisioning has been quarantined. See quarantine details for more information.**.
35+
If you encounter an accidental deletion you'll see it on the provisioning status page. It will say **Provisioning has been quarantined. See quarantine details for more information**.
3636

3737
You can click either **Allow deletes** or **View provisioning logs**.
3838

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -204,7 +204,7 @@ Use the steps below to provision roles for a user to your application. Note that
204204
![Add SingleAppRoleAssignment](./media/customize-application-attributes/edit-attribute-singleapproleassignment.png)
205205
- **Things to consider**
206206
- Ensure that multiple roles are not assigned to a user. We cannot guarantee which role will be provisioned.
207-
207+
- SingleAppRoleAssignments is not compatible with setting scope to "Sync All users and groups."
208208
- **Example request (POST)**
209209

210210
```json

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,8 @@ Let's cover each step:
7070
7171
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/cert-picker.png" alt-text="Screenshot of the certificate picker." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/cert-picker.png":::
7272

73-
1. Azure AD verifies the certificate revocation list to make sure the certificate is not revoked and is valid. Azure AD identifies the user in the tenant by using the [username binding configured](how-to-certificate-based-authentication.md#step-3-configure-username-binding-policy) on the tenant by mapping the certificate field value to user attribute value.
74-
1. If a unique user is found and the user has a conditional access policy and needs multifactor authentication (MFA) and the [certificate authentication binding rule](how-to-certificate-based-authentication.md#step-2-configure-authentication-binding-policy) satisfies MFA, then Azure AD signs the user in immediately. If the certificate satisfies only a single factor, then it requests the user for a second factor to complete Azure AD Multi-Factor Authentication.
73+
1. Azure AD verifies the certificate revocation list to make sure the certificate is not revoked and is valid. Azure AD identifies the user in the tenant by using the [username binding configured](how-to-certificate-based-authentication.md#step-4-configure-username-binding-policy) on the tenant by mapping the certificate field value to user attribute value.
74+
1. If a unique user is found and the user has a conditional access policy and needs multifactor authentication (MFA) and the [certificate authentication binding rule](how-to-certificate-based-authentication.md#step-3-configure-authentication-binding-policy) satisfies MFA, then Azure AD signs the user in immediately. If the certificate satisfies only a single factor, then it requests the user for a second factor to complete Azure AD Multi-Factor Authentication.
7575
1. Azure AD completes the sign-in process by sending a primary refresh token back to indicate successful sign-in.
7676
1. If the user sign-in is successful, the user can access the application.
7777

@@ -244,4 +244,4 @@ For the next test scenario, configure the authentication policy where the **poli
244244
- [Windows SmartCard logon using Azure AD CBA](concept-certificate-based-authentication-smartcard.md)
245245
- [Azure AD CBA on mobile devices (Android and iOS)](concept-certificate-based-authentication-mobile.md)
246246
- [FAQ](certificate-based-authentication-faq.yml)
247-
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)
247+
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -167,6 +167,12 @@ To switch the directory in the Azure portal, click the user account name in the
167167

168168
![External users can switch directory.](media/concept-registration-mfa-sspr-combined/switch-directory.png)
169169

170+
Or, you can specify a tenant by URL to access security information.
171+
172+
`https://mysignins.microsoft.com/security-info?tenant=<Tenant Name>`
173+
174+
`https://mysignins.microsoft.com/security-info/?tenantId=<Tenant ID>`
175+
170176
## Next steps
171177

172178
To get started, see the tutorials to [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md).

articles/active-directory/authentication/concept-sspr-writeback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Password writeback provides the following features:
4242
4343
To get started with SSPR writeback, complete either one or both of the following tutorials:
4444

45-
- [Tutorial: Enable self-service password reset (SSPR) writeback](tutorial-enable-cloud-sync-sspr-writeback.md)
45+
- [Tutorial: Enable self-service password reset (SSPR) writeback](tutorial-enable-sspr-writeback.md)
4646
- [Tutorial: Enable Azure Active Directory Connect cloud sync self-service password reset writeback to an on-premises environment (Preview)](tutorial-enable-cloud-sync-sspr-writeback.md)
4747

4848
## Azure AD Connect and cloud sync side-by-side deployment

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -129,8 +129,29 @@ For additional details see: [Understanding the certificate revocation process](.
129129

130130
[!INCLUDE [Set-AzureAD](../../../includes/active-directory-authentication-set-trusted-azuread.md)]
131131

132+
## Step 2: Enable CBA on the tenant
132133

133-
## Step 2: Configure authentication binding policy
134+
To enable the certificate-based authentication in the Azure Portal, complete the following steps:
135+
136+
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Authentication Policy Administrator.
137+
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
138+
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
139+
1. Under **Basics**, select **Yes** to enable CBA.
140+
1. CBA can be enabled for a targeted set of users.
141+
1. Click **All users** to enable all users.
142+
1. Click **Select users** to enable selected users or groups.
143+
1. Click **+ Add users**, select specific users and groups.
144+
1. Click **Select** to add them.
145+
146+
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/enable.png" alt-text="Screenshot of how to enable CBA.":::
147+
148+
Once certificate-based authentication is enabled on the tenant, all users in the tenant will see the option to sign in with a certificate. Only users who are enabled for certificate-based authentication will be able to authenticate using the X.509 certificate.
149+
150+
>[!NOTE]
151+
>The network administrator should allow access to certauth endpoint for the customer’s cloud environment in addition to login.microsoftonline.com. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
152+
153+
154+
## Step 3: Configure authentication binding policy
134155

135156
The authentication binding policy helps determine the strength of authentication to either a single factor or multi factor. An admin can change the default value from single-factor to multifactor and configure custom policy rules by mapping to issuer Subject or policy OID fields in the certificate.
136157

@@ -176,7 +197,7 @@ To enable the certificate-based authentication and configure user bindings in th
176197

177198
1. Click **Ok** to save any custom rule.
178199

179-
## Step 3: Configure username binding policy
200+
## Step 4: Configure username binding policy
180201

181202
The username binding policy helps determine the user in the tenant. By default, we map Principal Name in the certificate to onPremisesUserPrincipalName in the user object to determine the user.
182203

@@ -209,27 +230,6 @@ The final configuration will look like this image:
209230

210231
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/final.png" alt-text="Screenshot of the final configuration.":::
211232

212-
## Step 4: Enable CBA on the tenant
213-
214-
To enable the certificate-based authentication in the Azure MyApps portal, complete the following steps:
215-
216-
1. Sign in to the [MyApps portal](https://myapps.microsoft.com/) as an Authentication Policy Administrator.
217-
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
218-
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
219-
1. Under **Basics**, select **Yes** to enable CBA.
220-
1. CBA can be enabled for a targeted set of users.
221-
1. Click **All users** to enable all users.
222-
1. Click **Select users** to enable selected users or groups.
223-
1. Click **+ Add users**, select specific users and groups.
224-
1. Click **Select** to add them.
225-
226-
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/enable.png" alt-text="Screenshot of how to enable CBA.":::
227-
228-
Once certificate-based authentication is enabled on the tenant, all users in the tenant will see the option to sign in with a certificate. Only users who are enabled for certificate-based authentication will be able to authenticate using the X.509 certificate.
229-
230-
>[!NOTE]
231-
>The network administrator should allow access to certauth endpoint for the customer’s cloud environment in addition to login.microsoftonline.com. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
232-
233233
## Step 5: Test your configuration
234234

235235
This section covers how to test your certificate and custom authentication binding rules.

articles/active-directory/authentication/troubleshoot-certificate-based-authentication.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ This topic covers how to troubleshoot Azure AD certificate-based authentication
2525
2626
## Why don't I see an option to sign in using certificates against Azure Active Directory after I enter my username?
2727

28-
An administrator needs to enable CBA for the tenant to make the sign-in with certificate option available for users. For more information, see [Step 2: Configure authentication binding policy](how-to-certificate-based-authentication.md#step-2-configure-authentication-binding-policy).
28+
An administrator needs to enable CBA for the tenant to make the sign-in with certificate option available for users. For more information, see [Step 3: Configure authentication binding policy](how-to-certificate-based-authentication.md#step-3-configure-authentication-binding-policy).
2929

3030
## User-facing sign-in error messages
3131

@@ -47,12 +47,12 @@ Make sure the certificate is valid and works for the user binding and authentica
4747

4848
:::image type="content" border="true" source="./media/troubleshoot-certificate-based-authentication/reset.png" alt-text="Screenshot of password reset error." :::
4949

50-
Make sure the user is trying to sign in with the correct username. This error happens when a unique user can't be found using the [username binding](how-to-certificate-based-authentication.md#step-3-configure-username-binding-policy) on the certificate fields.
50+
Make sure the user is trying to sign in with the correct username. This error happens when a unique user can't be found using the [username binding](how-to-certificate-based-authentication.md#step-4-configure-username-binding-policy) on the certificate fields.
5151

5252
- Make sure user bindings are set correctly and the certificate field is mapped to the correct user Attribute.
5353
- Make sure the user Attribute contains the correct value that matches the certificate field value.
5454

55-
For more information, see [Step 3: Configure username binding policy](how-to-certificate-based-authentication.md#step-3-configure-username-binding-policy).
55+
For more information, see [Step 4: Configure username binding policy](how-to-certificate-based-authentication.md#step-4-configure-username-binding-policy).
5656

5757
If the user is a federated user moving to Azure AD and if the user binding configuration is Principal Name > onPremisesUserPrincipalName:
5858

@@ -70,7 +70,7 @@ There is also a known issue when a user who is not in scope for CBA ties to sign
7070

7171
:::image type="content" border="true" source="./media/troubleshoot-certificate-based-authentication/alt-failed.png" alt-text="Screenshot of the alternative error message for Azure Active Directory certificate-based authentication in Azure AD.":::
7272

73-
In both cases, the error can be resolved by making sure the user is in scope for Azure AD CBA. For more information, see [Step 4: Enable CBA on the tenant](how-to-certificate-based-authentication.md#step-4-enable-cba-on-the-tenant).
73+
In both cases, the error can be resolved by making sure the user is in scope for Azure AD CBA. For more information, see [Step 2: Enable CBA on the tenant](how-to-certificate-based-authentication.md#step-2-enable-cba-on-the-tenant).
7474

7575
### AADSTS90100: flowtoken parameter is empty or not valid
7676

0 commit comments

Comments
 (0)