Skip to content

Commit d3d7fb3

Browse files
committed
Merge remote-tracking branch 'refs/remotes/MicrosoftDocs/master'
2 parents 1ed04b6 + 75e4a52 commit d3d7fb3

File tree

1,024 files changed

+5615
-3535
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,024 files changed

+5615
-3535
lines changed

.openpublishing.redirection.json

Lines changed: 666 additions & 81 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Before enabling the new experience, review the article [Combined security inform
3636
Complete these steps to enable combined registration:
3737

3838
1. Sign in to the Azure portal as a user administrator or global administrator.
39-
2. Go to **Azure Active Directory** > **User settings** > **Manage settings for access panel preview features**.
39+
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature preview settings**.
4040
3. Under **Users can use preview features for registering and managing security info**, choose to enable for a **Selected** group of users or for **All** users.
4141

4242
![Enable the combined security info preview experience for All users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info-preview.png)
@@ -63,7 +63,7 @@ The following policy applies to all selected users, who attempt to register usin
6363

6464
![Create a CA policy to control security info registration](media/howto-registration-mfa-sspr-combined/require-registration-from-trusted-location.png)
6565

66-
1. In the **Azure portal**, browse to **Azure Active Directory** > **Conditional Access**
66+
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**
6767
1. Select **New policy**
6868
1. In Name, Enter a Name for this policy. For example, **Combined Security Info Registration on Trusted Networks**
6969
1. Under **Assignments**, click **Users and groups**, and select the users and groups you want this policy to apply to

articles/active-directory/conditional-access/controls.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: article
9-
ms.date: 11/21/2019
9+
ms.date: 12/20/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -112,7 +112,7 @@ Providers currently offering a compatible service include:
112112
- [Entrust Datacard](https://www.entrustdatacard.com/products/authentication/intellitrust)
113113
- [GSMA](https://mobileconnect.io/azure/)
114114
- [Ping Identity](https://documentation.pingidentity.com/pingid/pingidAdminGuide/index.shtml#pid_c_AzureADIntegration.html)
115-
- RSA
115+
- [RSA](https://community.rsa.com/docs/DOC-81278)
116116
- [SecureAuth](https://docs.secureauth.com/pages/viewpage.action?pageId=47238992#)
117117
- [Silverfort](https://www.silverfort.io/company/using-silverfort-mfa-with-azure-active-directory/)
118118
- [Symantec VIP](https://help.symantec.com/home/VIP_Integrate_with_Azure_AD)

articles/active-directory/conditional-access/howto-conditional-access-policy-block-legacy.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 12/12/2019
9+
ms.date: 12/20/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -31,9 +31,11 @@ The following steps will help create a Conditional Access policy to block legacy
3131
1. Under **Include**, select **All users**.
3232
1. Under **Exclude**, select **Users and groups** and choose any accounts that must maintain the ability to use legacy authentication.
3333
1. Select **Done**.
34+
1. Under **Cloud apps or actions** select **All cloud apps**.
35+
1. Select **Done**.
3436
1. Under **Conditions** > **Client apps (preview)**, set **Configure** to **Yes**.
3537
1. Check only the boxes **Mobile apps and desktop clients** > **Other clients**.
36-
2. Select **Done**.
38+
1. Select **Done**.
3739
1. Under **Access controls** > **Grant**, select **Block access**.
3840
1. Select **Select**.
3941
1. Confirm your settings and set **Enable policy** to **On**.

articles/active-directory/develop/scenario-web-app-call-api-acquire-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ public ModelAndView getUserFromGraph(HttpServletRequest httpRequest, HttpServlet
150150

151151
In the python sample, the code calling Microsoft graph is in [app.py#L53-L62](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/48637475ed7d7733795ebeac55c5d58663714c60/app.py#L53-L62).
152152

153-
It attempts to get a token from the token cache, and then calls the eb API after setting the authorization header. If it can't, it re-signs in the user.
153+
It attempts to get a token from the token cache, and then calls the web API after setting the authorization header. If it can't, it re-signs in the user.
154154

155155
```python
156156
@app.route("/graphcall")

articles/active-directory/managed-identities-azure-resources/how-to-manage-ua-identity-arm.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,10 +38,10 @@ It is not possible to list and delete a user-assigned managed identity using an
3838

3939
As with the Azure portal and scripting, Azure Resource Manager templates provide the ability to deploy new or modified resources defined by an Azure resource group. Several options are available for template editing and deployment, both local and portal-based, including:
4040

41-
- Using a [custom template from the Azure Marketplace](../../azure-resource-manager/resource-group-template-deploy-portal.md#deploy-resources-from-custom-template), which allows you to create a template from scratch, or base it on an existing common or [QuickStart template](https://azure.microsoft.com/documentation/templates/).
42-
- Deriving from an existing resource group, by exporting a template from either [the original deployment](../../azure-resource-manager/manage-resource-groups-portal.md#export-resource-groups-to-templates), or from the [current state of the deployment](../../azure-resource-manager/manage-resource-groups-portal.md#export-resource-groups-to-templates).
41+
- Using a [custom template from the Azure Marketplace](../../azure-resource-manager/templates/deploy-portal.md#deploy-resources-from-custom-template), which allows you to create a template from scratch, or base it on an existing common or [QuickStart template](https://azure.microsoft.com/documentation/templates/).
42+
- Deriving from an existing resource group, by exporting a template from either [the original deployment](../../azure-resource-manager/management/manage-resource-groups-portal.md#export-resource-groups-to-templates), or from the [current state of the deployment](../../azure-resource-manager/management/manage-resource-groups-portal.md#export-resource-groups-to-templates).
4343
- Using a local [JSON editor (such as VS Code)](../../azure-resource-manager/resource-manager-create-first-template.md), and then uploading and deploying by using PowerShell or CLI.
44-
- Using the Visual Studio [Azure Resource Group project](../../azure-resource-manager/vs-azure-tools-resource-groups-deployment-projects-create-deploy.md) to both create and deploy a template.
44+
- Using the Visual Studio [Azure Resource Group project](../../azure-resource-manager/templates/create-visual-studio-deployment-project.md) to both create and deploy a template.
4545

4646
## Create a user-assigned managed identity
4747

articles/active-directory/managed-identities-azure-resources/qs-configure-cli-windows-vm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ To create an Azure VM with the system-assigned managed identity enabled,your acc
5757
az login
5858
```
5959

60-
2. Create a [resource group](../../azure-resource-manager/resource-group-overview.md#terminology) for containment and deployment of your VM and its related resources, using [az group create](/cli/azure/group/#az-group-create). You can skip this step if you already have resource group you would like to use instead:
60+
2. Create a [resource group](../../azure-resource-manager/management/overview.md#terminology) for containment and deployment of your VM and its related resources, using [az group create](/cli/azure/group/#az-group-create). You can skip this step if you already have resource group you would like to use instead:
6161

6262
```azurecli-interactive
6363
az group create --name myResourceGroup --location westus
@@ -113,7 +113,7 @@ In this section, you will learn how to add and remove a user-assigned managed id
113113

114114
To assign a user-assigned identity to a VM during its creation, your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) and [Managed Identity Operator](/azure/role-based-access-control/built-in-roles#managed-identity-operator) role assignments. No additional Azure AD directory role assignments are required.
115115

116-
1. You can skip this step if you already have a resource group you would like to use. Create a [resource group](~/articles/azure-resource-manager/resource-group-overview.md#terminology) for containment and deployment of your user-assigned managed identity, using [az group create](/cli/azure/group/#az-group-create). Be sure to replace the `<RESOURCE GROUP>` and `<LOCATION>` parameter values with your own values. :
116+
1. You can skip this step if you already have a resource group you would like to use. Create a [resource group](~/articles/azure-resource-manager/management/overview.md#terminology) for containment and deployment of your user-assigned managed identity, using [az group create](/cli/azure/group/#az-group-create). Be sure to replace the `<RESOURCE GROUP>` and `<LOCATION>` parameter values with your own values. :
117117

118118
```azurecli-interactive
119119
az group create --name <RESOURCE GROUP> --location <LOCATION>

articles/active-directory/managed-identities-azure-resources/qs-configure-cli-windows-vmss.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ To create a virtual machine scale set with the system-assigned managed identity
6565
az login
6666
```
6767

68-
2. Create a [resource group](../../azure-resource-manager/resource-group-overview.md#terminology) for containment and deployment of your virtual machine scale set and its related resources, using [az group create](/cli/azure/group/#az-group-create). You can skip this step if you already have a resource group you would like to use instead:
68+
2. Create a [resource group](../../azure-resource-manager/management/overview.md#terminology) for containment and deployment of your virtual machine scale set and its related resources, using [az group create](/cli/azure/group/#az-group-create). You can skip this step if you already have a resource group you would like to use instead:
6969

7070
```azurecli-interactive
7171
az group create --name myResourceGroup --location westus
@@ -120,7 +120,7 @@ In this section, you learn how to enable and remove a user-assigned managed iden
120120

121121
This section walks you through creation of a virtual machine scale set and assignment of a user-assigned managed identity to the virtual machine scale set. If you already have a virtual machine scale set you want to use, skip this section and proceed to the next.
122122

123-
1. You can skip this step if you already have a resource group you would like to use. Create a [resource group](~/articles/azure-resource-manager/resource-group-overview.md#terminology) for containment and deployment of your user-assigned managed identity, using [az group create](/cli/azure/group/#az-group-create). Be sure to replace the `<RESOURCE GROUP>` and `<LOCATION>` parameter values with your own values. :
123+
1. You can skip this step if you already have a resource group you would like to use. Create a [resource group](~/articles/azure-resource-manager/management/overview.md#terminology) for containment and deployment of your user-assigned managed identity, using [az group create](/cli/azure/group/#az-group-create). Be sure to replace the `<RESOURCE GROUP>` and `<LOCATION>` parameter values with your own values. :
124124

125125
```azurecli-interactive
126126
az group create --name <RESOURCE GROUP> --location <LOCATION>

articles/active-directory/managed-identities-azure-resources/qs-configure-rest-vm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ In this section, you learn how to enable and disable system-assigned managed ide
4747

4848
To create an Azure VM with the system-assigned managed identity enabled,your account needs the [Virtual Machine Contributor](/azure/role-based-access-control/built-in-roles#virtual-machine-contributor) role assignment. No additional Azure AD directory role assignments are required.
4949

50-
1. Create a [resource group](../../azure-resource-manager/resource-group-overview.md#terminology) for containment and deployment of your VM and its related resources, using [az group create](/cli/azure/group/#az-group-create). You can skip this step if you already have resource group you would like to use instead:
50+
1. Create a [resource group](../../azure-resource-manager/management/overview.md#terminology) for containment and deployment of your VM and its related resources, using [az group create](/cli/azure/group/#az-group-create). You can skip this step if you already have resource group you would like to use instead:
5151

5252
```azurecli-interactive
5353
az group create --name myResourceGroup --location westus

articles/active-directory/managed-identities-azure-resources/qs-configure-rest-vmss.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ In this section, you learn how to enable and disable system-assigned managed ide
5656

5757
To create a virtual machine scale set with system-assigned managed identity enabled, you need create a virtual machine scale set and retrieve an access token to use CURL to call the Resource Manager endpoint with the system-assigned managed identity type value.
5858

59-
1. Create a [resource group](../../azure-resource-manager/resource-group-overview.md#terminology) for containment and deployment of your virtual machine scale set and its related resources, using [az group create](/cli/azure/group/#az-group-create). You can skip this step if you already have resource group you would like to use instead:
59+
1. Create a [resource group](../../azure-resource-manager/management/overview.md#terminology) for containment and deployment of your virtual machine scale set and its related resources, using [az group create](/cli/azure/group/#az-group-create). You can skip this step if you already have resource group you would like to use instead:
6060

6161
```azurecli-interactive
6262
az group create --name myResourceGroup --location westus

0 commit comments

Comments
 (0)