Skip to content

Commit d75e8e8

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ipv6ds-portal
2 parents e89a7a7 + 94c3158 commit d75e8e8

File tree

1,453 files changed

+8006
-4909
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,453 files changed

+8006
-4909
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,11 @@
3030
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path_from_root": "/articles/active-directory/saas-apps/netmotion-mobility-tutorial.md",
35+
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
36+
"redirect_document_id": false
37+
},
3338
{
3439
"source_path_from_root": "/articles/active-directory/fundamentals/whats-new-microsoft-365-government.md",
3540
"redirect_url": "/azure/active-directory/fundamentals/whats-new",
@@ -57,7 +62,7 @@
5762
},
5863
{
5964
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-create-trust-github.md",
60-
"redirect_url":"/azure/active-directory/develop/workload-identity-federation-create-trust",
65+
"redirect_url": "/azure/active-directory/develop/workload-identity-federation-create-trust",
6166
"redirect_document_id": false
6267
},
6368
{
@@ -2800,7 +2805,7 @@
28002805
"redirect_url": "/azure/active-directory/develop/howto-authenticate-service-principal-powershell",
28012806
"redirect_document_id": false
28022807
},
2803-
2808+
28042809
{
28052810
"source_path_from_root": "/articles/active-directory/develop/active-directory-devhowto-multi-tenant-overview.md",
28062811
"redirect_url": "/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5788,6 +5788,11 @@
57885788
"redirect_url": "/azure/automation/manage-run-as-account",
57895789
"redirect_document_id": false
57905790
},
5791+
{
5792+
"source_path_from_root": "/articles/automation/quickstarts/create-account-portal.md",
5793+
"redirect_url": "/azure/automation/create-azure-automation-account-portal",
5794+
"redirect_document_id": false
5795+
},
57915796
{
57925797
"source_path_from_root": "/articles/best-practices-availability-paired-regions.md",
57935798
"redirect_url": "/azure/availability-zones/cross-region-replication-azure",

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/07/2022
11+
ms.date: 08/15/2022
1212
ms.author: justinha
1313
ms.custom: devx-track-azurepowershell
1414

@@ -172,9 +172,15 @@ Before you begin the migration process, complete the following initial checks an
172172

173173
Make sure that network settings don't block necessary ports required for Azure AD DS. Ports must be open on both the Classic virtual network and the Resource Manager virtual network. These settings include route tables (although it's not recommended to use route tables) and network security groups.
174174

175-
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain. To view the ports required, see [Network security groups and required ports][network-ports].
175+
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain.
176176

177-
If you use secure LDAP, add a rule to the network security group to allow incoming traffic for *TCP* port *636*. For more information, see [Lock down secure LDAP access over the internet](tutorial-configure-ldaps.md#lock-down-secure-ldap-access-over-the-internet)
177+
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet your managed domain is deployed into.
178+
179+
| Inbound port number | Protocol | Source | Destination | Action | Required | Purpose |
180+
|:-----------:|:--------:|:----------------------------------:|:-----------:|:------:|:--------:|:--------|
181+
| 5986 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Management of your domain. |
182+
| 3389 | TCP | CorpNetSaw | Any | Allow | Optional | Debugging for support. |
183+
| 636 | TCP | AzureActiveDirectoryDomainServices | Inbound | Allow | Optional | Secure LDAP. |
178184

179185
Make a note of this target resource group, target virtual network, and target virtual network subnet. These resource names are used during the migration process.
180186

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 08/08/2022
4+
ms.date: 08/16/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/23/2022
9+
ms.date: 08/17/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -129,7 +129,7 @@ The following providers offer FIDO2 security keys of different form factors that
129129
| Octatco | ![y] | ![y]| ![n]| ![n]| ![n] | https://octatco.com/ |
130130
| OneSpan Inc. | ![n] | ![y]| ![n]| ![y]| ![n] | https://www.onespan.com/products/fido |
131131
| Swissbit | ![n] | ![y]| ![y]| ![n]| ![n] | https://www.swissbit.com/en/products/ishield-fido2/ |
132-
| Thales Group | ![n] | ![y]| ![y]| ![n]| ![n] | https://cpl.thalesgroup.com/access-management/authenticators/fido-devices |
132+
| Thales Group | ![n] | ![y]| ![y]| ![n]| ![y] | https://cpl.thalesgroup.com/access-management/authenticators/fido-devices |
133133
| Thetis | ![y] | ![y]| ![y]| ![y]| ![n] | https://thetis.io/collections/fido2 |
134134
| Token2 Switzerland | ![y] | ![y]| ![y]| ![n]| ![n] | https://www.token2.swiss/shop/product/token2-t2f2-alu-fido2-u2f-and-totp-security-key |
135135
| TrustKey Solutions | ![y] | ![y]| ![n]| ![n]| ![n] | https://www.trustkeysolutions.com/security-keys/ |

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -204,4 +204,3 @@ Additional context isn't supported for Network Policy Server (NPS).
204204
## Next steps
205205

206206
[Authentication methods in Azure Active Directory - Microsoft Authenticator app](concept-authentication-authenticator-app.md)
207-

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -255,4 +255,4 @@ Number matching isn't supported for Apple Watch notifications. Apple Watch need
255255

256256
## Next steps
257257

258-
[Authentication methods in Azure Active Directory](concept-authentication-authenticator-app.md)
258+
[Authentication methods in Azure Active Directory](concept-authentication-authenticator-app.md)

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 08/07/2022
9+
ms.date: 08/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -83,7 +83,7 @@ The fraud alert feature lets users report fraudulent attempts to access their re
8383
The following fraud alert configuration options are available:
8484

8585
* **Automatically block users who report fraud**. If a user reports fraud, the Azure AD Multi-Factor Authentication attempts for the user account are blocked for 90 days or until an administrator unblocks the account. An administrator can review sign-ins by using the sign-in report, and take appropriate action to prevent future fraud. An administrator can then [unblock](#unblock-a-user) the user's account.
86-
* **Code to report fraud during initial greeting**. When users receive a phone call to perform multi-factor authentication, they normally press **#** to confirm their sign-in. To report fraud, the user enters a code before pressing **#**. This code is **0** by default, but you can customize it.
86+
* **Code to report fraud during initial greeting**. When users receive a phone call to perform multi-factor authentication, they normally press **#** to confirm their sign-in. To report fraud, the user enters a code before pressing **#**. This code is **0** by default, but you can customize it. If automatic blocking is enabled, after the user presses **0#** to report fraud, they need to press **1** to confirm the account blocking.
8787

8888
> [!NOTE]
8989
> The default voice greetings from Microsoft instruct users to press **0#** to submit a fraud alert. If you want to use a code other than **0**, record and upload your own custom voice greetings with appropriate instructions for your users.
69.7 KB
Loading
26.9 KB
Loading

0 commit comments

Comments
 (0)