Skip to content

Commit d6e85ca

Browse files
authored
Merge pull request #246501 from anaharris-ms/china-name-change
Bulk Change: China name change
2 parents 031e524 + 6221897 commit d6e85ca

File tree

302 files changed

+646
-642
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

302 files changed

+646
-642
lines changed

articles/active-directory/architecture/5-secure-access-b2b.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ Some organizations have a blocklist of bad-actor domains from a managed security
7676

7777
You can control inbound and outbound access using cross tenant access settings. In addition, you can trust multi-factor authentication (MFA), a compliant device, and hybrid Azure Active Directory joined device (HAAJD) claims from external Azure AD tenants. When you configure an organizational policy, it applies to the Azure AD tenant and applies to users in that tenant, regardless of domain suffix.
7878

79-
You can enable collaboration across Microsoft clouds, such as Microsoft Azure operated by 21Vianet (Azure China) or Azure Government. Determine if your collaboration partners reside in a different Microsoft cloud.
79+
You can enable collaboration across Microsoft clouds, such as Microsoft Azure operated by 21Vianet or Azure Government. Determine if your collaboration partners reside in a different Microsoft cloud.
8080

8181
Learn more:
8282

articles/active-directory/architecture/backup-authentication-system.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,15 +84,15 @@ In addition to user authentication, the backup authentication system provides re
8484

8585
## Cloud environments that support the backup authentication system
8686

87-
The backup authentication system is supported in all cloud environments except Azure China 21vianet. The types of identities supported vary by cloud, as described in the following table.
87+
The backup authentication system is supported in all cloud environments except Microsoft Azure operated by 21Vianet. The types of identities supported vary by cloud, as described in the following table.
8888

8989
| Azure environment | Identities protected |
9090
| --- | --- |
9191
| Azure Commercial | Users, managed identities |
9292
| Azure Government | Users, managed identities |
9393
| Azure Government Secret | managed identities |
9494
| Azure Government Top Secret | managed identities |
95-
| Azure China | Not available |
95+
| Azure operated by 21Vianet | Not available |
9696

9797
## Appendix
9898

articles/active-directory/authentication/concept-mfa-data-residency.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ The following table shows the location for service logs for sovereign clouds.
115115

116116
| Sovereign cloud | Sign-in logs | Multifactor authentication activity report | Multifactor authentication service logs |
117117
|--------------------------------------|--------------------------------------|--------------------------------------------|-----------------------------------------|
118-
| Azure China 21Vianet | China | United States | United States |
118+
| Microsoft Azure operated by 21Vianet | China | United States | United States |
119119
| Microsoft Government Cloud | United States | United States | United States |
120120

121121
## Next steps

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Before combined registration, users registered authentication methods for Azure
2424

2525
Before enabling the new experience, review this administrator-focused documentation and the user-focused documentation to ensure you understand the functionality and effect of this feature. Base your training on the [user documentation](https://support.microsoft.com/account-billing/set-up-your-security-info-from-a-sign-in-prompt-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout.
2626

27-
Azure AD combined security information registration is available for Azure US Government but not Azure China 21Vianet.
27+
Azure AD combined security information registration is available for Azure US Government but not Microsoft Azure operated by 21Vianet.
2828

2929
*My Account* pages are localized based on the language settings of the computer accessing the page. Microsoft stores the most recent language used in the browser cache, so subsequent attempts to access the pages continue to render in the last language used. If you clear the cache, the pages re-render.
3030

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -113,14 +113,14 @@ The NPS server must be able to communicate with the following URLs over TCP port
113113

114114
* `https://login.microsoftonline.com`
115115
* `https://login.microsoftonline.us (Azure Government)`
116-
* `https://login.chinacloudapi.cn (Azure China 21Vianet)`
116+
* `https://login.chinacloudapi.cn (Microsoft Azure operated by 21Vianet)`
117117
* `https://credentials.azure.com`
118118
* `https://strongauthenticationservice.auth.microsoft.com`
119119
* `https://strongauthenticationservice.auth.microsoft.us (Azure Government)`
120-
* `https://strongauthenticationservice.auth.microsoft.cn (Azure China 21Vianet)`
120+
* `https://strongauthenticationservice.auth.microsoft.cn (Microsoft Azure operated by 21Vianet)`
121121
* `https://adnotifications.windowsazure.com`
122122
* `https://adnotifications.windowsazure.us (Azure Government)`
123-
* `https://adnotifications.windowsazure.cn (Azure China 21Vianet)`
123+
* `https://adnotifications.windowsazure.cn (Microsoft Azure operated by 21Vianet)`
124124

125125
Additionally, connectivity to the following URLs is required to complete the [setup of the adapter using the provided PowerShell script](#run-the-powershell-script):
126126

@@ -246,7 +246,7 @@ To provide load-balancing capabilities or for redundancy, repeat these steps on
246246
`[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12`
247247

248248
> [!IMPORTANT]
249-
> For customers that use the Azure Government or Azure China 21Vianet clouds, first edit the `Connect-MsolService` cmdlets in the *AzureMfaNpsExtnConfigSetup.ps1* script to include the *AzureEnvironment* parameters for the required cloud. For example, specify *-AzureEnvironment USGovernment* or *-AzureEnvironment AzureChinaCloud*.
249+
> For customers that use the Azure Government or Microsoft Azure operated by 21Vianet clouds, first edit the `Connect-MsolService` cmdlets in the *AzureMfaNpsExtnConfigSetup.ps1* script to include the *AzureEnvironment* parameters for the required cloud. For example, specify *-AzureEnvironment USGovernment* or *-AzureEnvironment AzureChinaCloud*.
250250
>
251251
> For more information, see [Connect-MsolService parameter reference](/powershell/module/msonline/connect-msolservice#parameters).
252252
@@ -263,14 +263,14 @@ If your previous computer certificate has expired, and a new certificate has bee
263263
> [!NOTE]
264264
> If you use your own certificates instead of generating certificates with the PowerShell script, make sure that they align to the NPS naming convention. The subject name must be **CN=\<TenantID\>,OU=Microsoft NPS Extension**.
265265
266-
### Microsoft Azure Government or Azure China 21Vianet additional steps
266+
### Microsoft Azure Government or Microsoft Azure operated by 21Vianet additional steps
267267

268-
For customers that use the Azure Government or Azure China 21Vianet clouds, the following additional configuration steps are required on each NPS server.
268+
For customers that use the Azure Government or Azure operated by 21Vianet clouds, the following additional configuration steps are required on each NPS server.
269269

270270
> [!IMPORTANT]
271-
> Only configure these registry settings if you're an Azure Government or Azure China 21Vianet customer.
271+
> Only configure these registry settings if you're an Azure Government or Azure operated by 21Vianet customer.
272272
273-
1. If you're an Azure Government or Azure China 21Vianet customer, open **Registry Editor** on the NPS server.
273+
1. If you're an Azure Government or Azure operated by 21Vianet customer, open **Registry Editor** on the NPS server.
274274
1. Navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa`.
275275
1. For Azure Government customers, set the following key values.:
276276

@@ -280,7 +280,7 @@ For customers that use the Azure Government or Azure China 21Vianet clouds, the
280280
| AZURE_MFA_RESOURCE_HOSTNAME | adnotifications.windowsazure.us |
281281
| STS_URL | https://login.microsoftonline.us/ |
282282

283-
1. For Azure China 21Vianet customers, set the following key values:
283+
1. For Microsoft Azure operated by 21Vianet customers, set the following key values:
284284

285285
| Registry key | Value |
286286
|--------------------|-----------------------------------|

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Smart lockout helps lock out bad actors that try to guess your users' passwords
2121

2222
## How smart lockout works
2323

24-
By default, smart lockout locks the account from sign-in attempts for one minute after 10 failed attempts for Azure Public and Azure China 21Vianet tenants and 3 for Azure US Government tenants. The account locks again after each subsequent failed sign-in attempt, for one minute at first and longer in subsequent attempts. To minimize the ways an attacker could work around this behavior, we don't disclose the rate at which the lockout period grows over additional unsuccessful sign-in attempts.
24+
By default, smart lockout locks the account from sign-in attempts for one minute after 10 failed attempts for Azure Public and Microsoft Azure operated by 21Vianet tenants and 3 for Azure US Government tenants. The account locks again after each subsequent failed sign-in attempt, for one minute at first and longer in subsequent attempts. To minimize the ways an attacker could work around this behavior, we don't disclose the rate at which the lockout period grows over additional unsuccessful sign-in attempts.
2525

2626
Smart lockout tracks the last three bad password hashes to avoid incrementing the lockout counter for the same password. If someone enters the same bad password multiple times, this behavior won't cause the account to lock out.
2727

@@ -62,7 +62,7 @@ To verify your on-premises AD DS account lockout policy, complete the following
6262

6363
## Manage Azure AD smart lockout values
6464

65-
Based on your organizational requirements, you can customize the Azure AD smart lockout values. Customization of the smart lockout settings, with values specific to your organization, requires Azure AD Premium P1 or higher licenses for your users. Customization of the smart lockout settings is not available for Azure China 21Vianet tenants.
65+
Based on your organizational requirements, you can customize the Azure AD smart lockout values. Customization of the smart lockout settings, with values specific to your organization, requires Azure AD Premium P1 or higher licenses for your users. Customization of the smart lockout settings is not available for Microsoft Azure operated by 21Vianet tenants.
6666

6767
To check or modify the smart lockout values for your organization, complete the following steps:
6868

articles/active-directory/develop/authentication-national-cloud.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ National clouds are physically isolated instances of Azure. These regions of Azu
2222
Including the global Azure cloud, Azure Active Directory (Azure AD) is deployed in the following national clouds:
2323

2424
- Azure Government
25-
- Azure China 21Vianet
25+
- Microsoft Azure operated by 21Vianet
2626
- Azure Germany ([Closed on October 29, 2021](https://www.microsoft.com/cloud-platform/germany-cloud-regions)). Learn more about [Azure Germany migration](#azure-germany-microsoft-cloud-deutschland).
2727

2828
The individual national clouds and the global Azure cloud are cloud _instances_. Each cloud instance is separate from the others and has its own environment and _endpoints_. Cloud-specific endpoints include OAuth 2.0 access token and OpenID Connect ID token request endpoints, and URLs for app management and deployment, like the Azure portal.
@@ -93,5 +93,5 @@ Learn how to use the [Microsoft Authentication Library (MSAL) in a national clou
9393
National cloud documentation:
9494

9595
- [Azure Government](../../azure-government/index.yml)
96-
- [Azure China 21Vianet](/azure/china/)
96+
- [Microsoft Azure operated by 21Vianet](/azure/china/)
9797
- [Azure Germany (Closed on October 29, 2021)](../../germany/index.yml)

articles/active-directory/develop/msal-national-cloud.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ In addition to the Microsoft worldwide cloud, the Microsoft Authentication Libra
2525
Including the global Azure cloud, Azure Active Directory (Azure AD) is deployed in the following national clouds: 
2626

2727
- Azure Government
28-
- Azure China 21Vianet
28+
- Microsoft Azure operated by 21Vianet
2929
- Azure Germany ([Closing on October 29, 2021](https://www.microsoft.com/cloud-platform/germany-cloud-regions))
3030

3131
This guide demonstrates how to sign in to work and school accounts, get an access token, and call the Microsoft Graph API in the [Azure Government cloud](https://azure.microsoft.com/global-infrastructure/government/) environment.
@@ -216,5 +216,5 @@ See [National cloud authentication endpoints](authentication-national-cloud.md)
216216
National cloud documentation:
217217

218218
- [Azure Government](../../azure-government/index.yml)
219-
- [Azure China 21Vianet](/azure/china/)
219+
- [Microsoft Azure operated by 21Vianet](/azure/china/)
220220
- [Azure Germany (closes on October 29, 2021)](../../germany/index.yml)

articles/active-directory/develop/msal-net-migration-confidential-client.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -534,7 +534,7 @@ If you get an exception with either of the following messages:
534534
Troubleshoot the exception using these steps:
535535

536536
1. Confirm that you're using the latest version of [MSAL.NET](https://www.nuget.org/packages/Microsoft.Identity.Client/).
537-
1. Confirm that the authority host that you set when building the confidential client app and the authority host that you used with ADAL are similar. In particular, is it the same [cloud](msal-national-cloud.md) (Azure Government, Azure China 21Vianet, or Azure Germany)?
537+
1. Confirm that the authority host that you set when building the confidential client app and the authority host that you used with ADAL are similar. In particular, is it the same [cloud](msal-national-cloud.md) (Azure Government, Microsoft Azure operated by 21Vianet, or Azure Germany)?
538538

539539
### MsalClientException
540540

articles/active-directory/develop/msal-net-migration-public-client.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -488,7 +488,7 @@ If you get an exception with either of the following messages:
488488
You can troubleshoot the exception by using these steps:
489489

490490
1. Confirm that you're using the latest version of MSAL.NET.
491-
1. Confirm that the authority host that you set when building the confidential client application and the authority host that you used with ADAL are similar. In particular, is it the same [cloud](msal-national-cloud.md) (Azure Government, Azure China 21Vianet, or Azure Germany)?
491+
1. Confirm that the authority host that you set when building the confidential client application and the authority host that you used with ADAL are similar. In particular, is it the same [cloud](msal-national-cloud.md) (Azure Government, Microsoft Azure operated by 21Vianet, or Azure Germany)?
492492

493493
## Next steps
494494

0 commit comments

Comments
 (0)