Skip to content

Commit d7b1675

Browse files
authored
Merge pull request #105737 from julieMSFT/release-rebrand-sqldw
Dirty PR to resolve merge conflicts with master in release-rebrand-sqldw
2 parents 9b6f212 + c2cc1e2 commit d7b1675

File tree

623 files changed

+3423
-2391
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

623 files changed

+3423
-2391
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3666,6 +3666,11 @@
36663666
"redirect_url": "/azure/architecture",
36673667
"redirect_document_id": false
36683668
},
3669+
{
3670+
"source_path": "articles/azure-monitor/azure-monitor-log-hub.md",
3671+
"redirect_url": "/azure/azure-monitor/overview",
3672+
"redirect_document_id": false
3673+
},
36693674
{
36703675
"source_path": "articles/cloud-services/cloud-services-dotnet-diagnostics-storage.md",
36713676
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-to-storage",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -350,8 +350,9 @@
350350
- name: Azure Monitor
351351
href: azure-monitor.md
352352
displayName: log, logs, logging, usage, events
353-
- name: Account management
353+
- name: Manage users - Microsoft Graph
354354
href: manage-user-accounts-graph-api.md
355+
displayName: account, accounts
355356
- name: Deploy with Azure Pipelines
356357
href: deploy-custom-policies-devops.md
357358
displayName: azure devops, ci/cd, cicd, custom policy, policies

articles/active-directory-b2c/phone-authentication.md

Lines changed: 26 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,35 @@
11
---
2-
title: Phone sign-up and sign-in with custom policies
2+
title: Phone sign-up and sign-in with custom policies (Preview)
33
titleSuffix: Azure AD B2C
4-
description: Learn how to send one-time passwords in text messages to your application users' phones with custom policies in Azure Active Directory B2C.
4+
description: Send one-time passwords (OTP) in text messages to your application users' phones with custom policies in Azure Active Directory B2C.
55
services: active-directory-b2c
66
author: mmacy
77
manager: celestedg
88

99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 12/17/2019
12+
ms.date: 02/25/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
1616

17-
# Set up phone sign-up and sign-in with custom policies in Azure AD B2C
17+
# Set up phone sign-up and sign-in with custom policies in Azure AD B2C (Preview)
1818

1919
Phone sign-up and sign-in in Azure Active Directory B2C (Azure AD B2C) enables your users to sign up and sign in to your applications by using a one-time password (OTP) sent in a text message to their phone. One-time passwords can help minimize the risk of your users forgetting or having their passwords compromised.
2020

2121
Follow the steps in this article to use the custom policies to enable your customers to sign up and sign in to your applications by using a one-time password sent to their phone.
2222

2323
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
2424

25+
## Pricing
26+
27+
One-time passwords are sent to your users by using SMS text messages, and you may be charged for each message sent. For pricing information, see the **Separate Charges** section of [Azure Active Directory B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/).
28+
2529
## Prerequisites
2630

31+
You need the following resources in place before setting up OTP.
32+
2733
* [Azure AD B2C tenant](tutorial-create-tenant.md)
2834
* [Web application registered](tutorial-register-applications.md) in your tenant
2935
* [Custom policies](custom-policy-get-started.md) uploaded to your tenant
@@ -66,6 +72,22 @@ As you upload each file, Azure adds the prefix `B2C_1A_`.
6672
1. Select **Run now** and sign up using an email address or a phone number.
6773
1. Select **Run now** once again and sign in with the same account to confirm that you have the correct configuration.
6874

75+
## Get user account by phone number
76+
77+
A user that signs up with a phone number but does not provide a recovery email address is recorded in your Azure AD B2C directory with their phone number as their sign-in name. If the user then wishes to change their phone number, your help desk or support team must first find their account, and then update their phone number.
78+
79+
You can find a user by their phone number (sign-in name) by using [Microsoft Graph](manage-user-accounts-graph-api.md):
80+
81+
```http
82+
GET https://graph.microsoft.com/v1.0/users?$filter=identities/any(c:c/issuerAssignedId eq '+{phone number}' and c/issuer eq '{tenant name}.onmicrosoft.com')
83+
```
84+
85+
For example:
86+
87+
```http
88+
GET https://graph.microsoft.com/v1.0/users?$filter=identities/any(c:c/issuerAssignedId eq '+450334567890' and c/issuer eq 'contosob2c.onmicrosoft.com')
89+
```
90+
6991
## Next steps
7092

7193
You can find the phone sign-up and sign-in custom policy starter pack (and other starter packs) on GitHub:

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ The following table provides a list of the features that are available in the va
3939

4040
| Feature | Azure AD Free - Security defaults | Azure AD Free - Azure AD Global Administrators | Office 365 Business Premium, E3, or E5 | Azure AD Premium P1 or P2 |
4141
| --- |:---:|:---:|:---:|:---:|
42-
| Protect Azure AD admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) |||
42+
| Protect Azure AD tenant admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) |||
4343
| Mobile app as a second factor |||||
4444
| Phone call as a second factor | ||||
4545
| SMS as a second factor | ||||

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/21/2020
9+
ms.date: 02/26/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -52,7 +52,7 @@ Selecting this checkbox will require users to perform Azure Multi-Factor Authent
5252

5353
Organizations who have deployed Microsoft Intune can use the information returned from their devices to identify devices that meet specific compliance requirements. This policy compliance information is forwarded from Intune to Azure AD where Conditional Access can make decisions to grant or block access to resources. For more information about compliance policies, see the article [Set rules on devices to allow access to resources in your organization using Intune](https://docs.microsoft.com/intune/protect/device-compliance-get-started).
5454

55-
A device can be marked as compliant by Intune (for any device OS) or by third-party MDM system for Windows 10 devices. Third-party MDM systems for device OS types other than Windows 10 are not supported.
55+
A device can be marked as compliant by Intune (for any device OS) or by third-party MDM system for Windows 10 devices. Jamf pro is the only supported third-party MDM system. More information about integration can be found in the article, [Integrate Jamf Pro with Intune for compliance](/intune/protect/conditional-access-integrate-jamf).
5656

5757
Devices must be registered in Azure AD before they can be marked as compliant. More information about device registration can be found in the article, [What is a device identity](../devices/overview.md).
5858

articles/active-directory/develop/howto-authenticate-service-principal-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ You can set the scope at the level of the subscription, resource group, or resou
4646

4747
## Create service principal with self-signed certificate
4848

49-
The following example covers a simple scenario. It uses [New-​AzAD​Service​Principal](/powershell/module/az.resources/new-azadserviceprincipal) to create a service principal with a self-signed certificate, and uses [New-​Azure​Rm​Role​Assignment](/powershell/module/az.resources/new-azroleassignment) to assign the [Reader](/azure/role-based-access-control/built-in-roles#reader) role to the service principal. The role assignment is scoped to your currently selected Azure subscription. To select a different subscription, use [Set-AzContext](/powershell/module/Az.Accounts/Set-AzContext).
49+
The following example covers a simple scenario. It uses [New-​AzAD​Service​Principal](/powershell/module/az.resources/new-azadserviceprincipal) to create a service principal with a self-signed certificate, and uses [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment) to assign the [Reader](/azure/role-based-access-control/built-in-roles#reader) role to the service principal. The role assignment is scoped to your currently selected Azure subscription. To select a different subscription, use [Set-AzContext](/powershell/module/Az.Accounts/Set-AzContext).
5050

5151
> [!NOTE]
5252
> The New-SelfSignedCertificate cmdlet and the PKI module are currently not supported in PowerShell Core.

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 22 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
12-
ms.date: 10/14/2019
12+
ms.date: 02/26/2020
1313
ms.author: ryanwi
1414
ms.reviewer: tomfitz
1515
ms.custom: aaddev, seoapril2019, identityplatformtop40
@@ -81,16 +81,26 @@ Daemon applications can use two forms of credentials to authenticate with Azure
8181

8282
### Upload a certificate
8383

84-
You can use an existing certificate if you have one. Optionally, you can create a self-signed certificate for testing purposes. Open PowerShell and run [New-SelfSignedCertificate](/powershell/module/pkiclient/new-selfsignedcertificate) with the following parameters to create a self-signed certificate in the user certificate store on your computer:
84+
You can use an existing certificate if you have one. Optionally, you can create a self-signed certificate for *testing purposes only*. Open PowerShell and run [New-SelfSignedCertificate](/powershell/module/pkiclient/new-selfsignedcertificate) with the following parameters to create a self-signed certificate in the user certificate store on your computer:
8585

8686
```powershell
8787
$cert=New-SelfSignedCertificate -Subject "CN=DaemonConsoleCert" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature
8888
```
8989

9090
Export this certificate to a file using the [Manage User Certificate](/dotnet/framework/wcf/feature-details/how-to-view-certificates-with-the-mmc-snap-in) MMC snap-in accessible from the Windows Control Panel.
9191

92+
1. Select **Run** from the **Start** menu, and then enter **certmgr.msc**.
93+
94+
The Certificate Manager tool for the current user appears.
95+
96+
1. To view your certificates, under **Certificates - Current User** in the left pane, expand the **Personal** directory.
97+
1. Right-click on the cert you created, select **All tasks->Export**.
98+
1. Follow the Certificate Export wizard. Export the private key, specify a password for the cert file, and export to a file.
99+
92100
To upload the certificate:
93101

102+
1. Select **Azure Active Directory**.
103+
1. From **App registrations** in Azure AD, select your application.
94104
1. Select **Certificates & secrets**.
95105
1. Select **Upload certificate** and select the certificate (an existing certificate or the self-signed certificate you exported).
96106

@@ -142,15 +152,21 @@ In your Azure subscription, your account must have `Microsoft.Authorization/*/Wr
142152

143153
To check your subscription permissions:
144154

145-
1. Select your account in the upper right corner, and select **... -> My permissions**.
155+
1. Search for and select **Subscriptions**, or select **Subscriptions** on the **Home** page.
146156

147-
![Select your account and your user permissions](./media/howto-create-service-principal-portal/select-my-permissions.png)
157+
![Search](./media/howto-create-service-principal-portal/select-subscription.png)
158+
159+
1. Select the subscription you want to create the service principal in.
160+
161+
![Select subscription for assignment](./media/howto-create-service-principal-portal/select-one-subscription.png)
162+
163+
If you don't see the subscription you're looking for, select **global subscriptions filter**. Make sure the subscription you want is selected for the portal.
148164

149-
1. From the drop-down list, select the subscription you want to create the service principal in. Then, select **Click here to view complete access details for this subscription**.
165+
1. Select **My permissions**. Then, select **Click here to view complete access details for this subscription**.
150166

151167
![Select the subscription you want to create the service principal in](./media/howto-create-service-principal-portal/view-details.png)
152168

153-
1. Select **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign a role to an AD app. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned the Owner role, which means that user has adequate permissions.
169+
1. Select **View** in **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign a role to an AD app. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned the Owner role, which means that user has adequate permissions.
154170

155171
![This example shows the user is assigned the Owner role](./media/howto-create-service-principal-portal/view-user-role.png)
156172

75.3 KB
Loading

articles/active-directory/develop/reply-url.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ The Azure AD application model doesn't support wildcard URIs for apps that are c
4949
> [!NOTE]
5050
> The new [App registrations](https://go.microsoft.com/fwlink/?linkid=2083908) experience doesn't allow developers to add wildcard URIs on the UI. Adding wilcard URI for apps that sign in work or school accounts is supported only through the app manifest editor. Going forward, new apps won't be able to use wildcards in the redirect URI. However, older apps that contain wildcards in redirect URIs will continue to work.
5151
52-
If your scenario requires more redirect URIs than the maximum limit allowed, instead of adding a wildcard redirect URI, consider one of the following approaches.
52+
If your scenario requires more redirect URIs than the maximum limit allowed, instead of adding a wildcard redirect URI, consider the following approach.
5353

5454
### Use a state parameter
5555

@@ -66,10 +66,6 @@ In this approach:
6666
> [!NOTE]
6767
> This approach allows a compromised client to modify the additional parameters sent in the state parameter, thereby redirecting the user to a different URL, which is the [open redirector threat](https://tools.ietf.org/html/rfc6819#section-4.2.4) described in RFC 6819. Therefore, the client must protect these parameters by encrypting the state or verifying it by some other means such as validating domain name in the redirect URI against the token.
6868
69-
### Add redirect URIs to service principals
70-
71-
Another approach is to add redirect URIs to the [service principals](app-objects-and-service-principals.md#application-and-service-principal-relationship) that represent your app registration in any Azure AD tenant. You can use this approach when you can't use a state parameter or your scenario requires you to add new redirect URIs to your app registration for every new tenant you support.
72-
7369
## Next steps
7470

7571
- Learn about the [Application manifest](reference-app-manifest.md)

articles/active-directory/reports-monitoring/concept-audit-logs.md

Lines changed: 16 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -38,11 +38,11 @@ This article gives you an overview of the audit report.
3838

3939
## Who can access the data?
4040

41-
* Users in the **Security Administrator**, **Security Reader**, **Report Reader** or **Global Administrator** roles
41+
* Users in the **Security Administrator**, **Security Reader**, **Report Reader** , **Global Reader** or **Global Administrator** roles
4242

4343
## Audit logs
4444

45-
The Azure AD audit logs provide records of system activities for compliance. To access the audit report, select **Audit logs** in the **Activity** section of **Azure Active Directory**. Note that audit logs may have a latency of up to an hour, so it may take that long for audit activity data to show up in the portal after you have completed the task.
45+
The Azure AD audit logs provide records of system activities for compliance. To access the audit report, select **Audit logs** in the **Monitoring** section of **Azure Active Directory**. Note that audit logs may have a latency of up to an hour, so it may take that long for audit activity data to show up in the portal after you have completed the task.
4646

4747

4848

@@ -87,16 +87,20 @@ You can filter the audit data on the following fields:
8787
The **Service** filter allows you to select from a drop-down list of the following services:
8888

8989
- All
90+
- AAD Management UX
9091
- Access Reviews
91-
- Account Provisioning
92-
- Application SSO
92+
- Account Provisioning
93+
- Application Proxy
9394
- Authentication Methods
9495
- B2C
9596
- Conditional Access
9697
- Core Directory
9798
- Entitlement Management
99+
- Hybrid Authentication
98100
- Identity Protection
99101
- Invited Users
102+
- MIM Service
103+
- MyApps
100104
- PIM
101105
- Self-service Group Management
102106
- Self-service Password Management
@@ -115,7 +119,11 @@ The **Category** filter enables you to select one of the following filters:
115119
- DirectoryManagement
116120
- EntitlementManagement
117121
- GroupManagement
122+
- KerberosDomain
123+
- KeyManagement
124+
- Label
118125
- Other
126+
- PermissionGrantPolicy
119127
- Policy
120128
- ResourceManagement
121129
- RoleManagement
@@ -131,14 +139,13 @@ The **Status** filter allows you to filter based on the status of an audit opera
131139
- Success
132140
- Failure
133141

134-
The **Target** filter allows you to search for a particular target by name or user principal name (UPN). The target name and UPN are case-sensitive.
142+
The **Target** filter allows you to search for a particular target by the starting of the name or user principal name (UPN). The target name and UPN are case-sensitive.
135143

136-
The **Initiated by** filter enables you to define an actor's name or a universal principal name (UPN). The name and UPN are case-sensitive.
144+
The **Initiated by** filter enables you to define what an actor's name or a universal principal name (UPN) starts with. The name and UPN are case-sensitive.
137145

138146
The **Date range** filter enables to you to define a timeframe for the returned data.
139147
Possible values are:
140148

141-
- 1 month
142149
- 7 days
143150
- 24 hours
144151
- Custom
@@ -176,11 +183,11 @@ With user and group-based audit reports, you can get answers to questions such a
176183

177184
- What licenses have been assigned to a group or a user?
178185

179-
If you want to review only auditing data that is related to users, you can find a filtered view under **Audit logs** in the **Activity** section of the **Users** tab. This entry point has **UserManagement** as preselected category.
186+
If you want to review only auditing data that is related to users, you can find a filtered view under **Audit logs** in the **Monitoring** section of the **Users** tab. This entry point has **UserManagement** as preselected category.
180187

181188
![Audit logs](./media/concept-audit-logs/users.png "Audit logs")
182189

183-
If you want to review only auditing data that is related to groups, you can find a filtered view under **Audit logs** in the **Activity** section of the **Groups** tab. This entry point has **GroupManagement** as preselected category.
190+
If you want to review only auditing data that is related to groups, you can find a filtered view under **Audit logs** in the **Monitoring** section of the **Groups** tab. This entry point has **GroupManagement** as preselected category.
184191

185192
![Audit logs](./media/concept-audit-logs/groups.png "Audit logs")
186193

0 commit comments

Comments
 (0)