Skip to content

Commit d845257

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-ignite-sentinel-honeytokens-solution
2 parents 57fbfbf + 92ac019 commit d845257

File tree

352 files changed

+4128
-3824
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

352 files changed

+4128
-3824
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -403,6 +403,11 @@
403403
"redirect_url": "/articles/load-balancer/concepts",
404404
"redirect_document_id": false
405405
},
406+
{
407+
"source_path_from_root": "/articles/frontdoor/standard-premium/resource-manager-template-samples.md",
408+
"redirect_url": "/articles/frontdoor/front-door-quickstart-template-samples",
409+
"redirect_document_id": false
410+
},
406411
{
407412
"source_path_from_root": "/articles/azure-sql/database/doc-changes-updates-release-notes.md",
408413
"redirect_url": "/azure/azure-sql/database/doc-changes-updates-release-notes-whats-new",

articles/active-directory/app-provisioning/on-premises-ecma-troubleshoot.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,25 @@
11
---
2-
title: 'Troubleshooting issues with the ECMA Connector Host and Azure AD'
2+
title: 'Troubleshooting issues with provisioning to on-premises applications'
33
description: Describes how to troubleshoot various issues you might encounter when you install and use the ECMA Connector Host.
44
services: active-directory
55
author: billmath
66
manager: karenh444
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 08/24/2021
10+
ms.date: 10/21/2021
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

16-
# Troubleshoot ECMA Connector Host issues
16+
# Troubleshoot on-premises application provisioning
1717

1818
>[!IMPORTANT]
1919
> The on-premises provisioning preview is currently in an invitation-only preview. To request access to the capability, use the [access request form](https://aka.ms/onpremprovisioningpublicpreviewaccess). We'll open the preview to more customers and connectors over the next few months as we prepare for general availability.
2020
2121
## Troubleshoot test connection issues
22-
After you configure the ECMA host and provisioning agent, it's time to test connectivity from the Azure Active Directory (Azure AD) provisioning service to the provisioning agent, the ECMA host, and the application. To perform this end-to-end test, select **Test connection** in the application in the Azure portal. When the test connection fails, try the following troubleshooting steps:
22+
After you configure the provisioning agent and ECMA host, it's time to test connectivity from the Azure Active Directory (Azure AD) provisioning service to the provisioning agent, the ECMA host, and the application. To perform this end-to-end test, select **Test connection** in the application in the Azure portal. When the test connection fails, try the following troubleshooting steps:
2323

2424
1. Check that the agent and ECMA host are running:
2525
1. On the server with the agent installed, open **Services** by going to **Start** > **Run** > **Services.msc**.

articles/active-directory/app-provisioning/on-premises-sql-connector-configure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure AD ECMA Connector Host generic SQL connector configuration
3-
description: This document describes how to configure the Azure AD ECMA Connector Host generic SQL connector.
2+
title: Provisioning users into SQL based applications using the ECMA Connector host
3+
description: Provisioning users into SQL based applications using the ECMA Connector host
44
services: active-directory
55
author: billmath
66
manager: karenh444
@@ -13,7 +13,7 @@ ms.author: billmath
1313
ms.reviewer: arvinh
1414
---
1515

16-
# Azure AD ECMA Connector Host generic SQL connector configuration
16+
# Provisioning users into SQL based applications
1717
The following documentation provides configuration and tutorial information demonstrating how the generic SQL connector and the ECMA Connector Host can be used with a SQL Server.
1818

1919

articles/active-directory/app-provisioning/toc.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
href: customize-application-attributes.md
1919
- name: App specific provisioning tutorials
2020
href: /azure/active-directory/saas-apps
21-
- name: Azure AD ECMA Connector Host Generic SQL Connector
21+
- name: Provisioning to SQL based apps
2222
href: tutorial-ecma-sql-connector.md
2323
- name: Concepts
2424
expanded: true
@@ -74,13 +74,13 @@
7474
href: application-provisioning-config-problem-no-users-provisioned.md
7575
- name: Missing source attribute
7676
href: user-provisioning-sync-attributes-for-mapping.md
77-
- name: Troubleshooting ECMA Connector Host
77+
- name: Troubleshooting on-premises provisioning
7878
href: on-premises-ecma-troubleshoot.md
7979
- name: Provisioning logs
8080
href: ../reports-monitoring/concept-provisioning-logs.md?context=%2fazure%2factive-directory%2fapp-provisioning%2fcontext%2fapp-provisioning-context
8181
- name: On-premises app provisioning
8282
items:
83-
- name: Generic SQL connector configuration
83+
- name: Provisioning to SQL based apps
8484
href: on-premises-sql-connector-configure.md
8585
- name: Generic LDAP Connector configuration
8686
href: on-premises-ldap-connector-configure.md

articles/active-directory/app-provisioning/tutorial-ecma-sql-connector.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Azure AD ECMA Connector Host generic SQL connector tutorial
3-
description: This tutorial describes how to use the on-premises application provisioning generic SQL connector.
2+
title: Azure AD Provisioning to SQL applications
3+
description: This tutorial describes how to provision users from Azure AD into a SQL database.
44
services: active-directory
55
author: billmath
66
manager: karenh444
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: tutorial
10-
ms.date: 07/13/2021
10+
ms.date: 10/21/2021
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.reviewer: arvinh
@@ -16,7 +16,7 @@ ms.collection: M365-identity-device-management
1616

1717

1818

19-
# Azure AD ECMA Connector Host generic SQL connector tutorial
19+
# Configuring Azure AD to provision users into a SQL database
2020

2121
[!INCLUDE [active-directory-app-provisioning-sql.md](../../../includes/active-directory-app-provisioning-sql.md)]
2222

articles/active-directory/authentication/concept-authentication-authenticator-app.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/22/2021
9+
ms.date: 10/29/2021
1010

1111
ms.author: justinha
1212
author: justinha
@@ -29,9 +29,9 @@ To use the Authenticator app at a sign-in prompt rather than a username and pass
2929
3030
## Passwordless sign-in
3131

32-
Instead of seeing a prompt for a password after entering a username, a user that has enabled phone sign-in from the Microsoft Authenticator app sees a message to tap a number in their app. When the correct number is selected, the sign-in process is complete.
32+
Instead of seeing a prompt for a password after entering a username, a user that has enabled phone sign-in from the Microsoft Authenticator app sees a message to enter a number in their app. When the correct number is selected, the sign-in process is complete.
3333

34-
![Example of a browser sign-in asking for user to approve the sign-in](./media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app.png)
34+
![Example of a browser sign-in asking for user to approve the sign-in.](./media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app.png)
3535

3636
This authentication method provides a high level of security, and removes the need for the user to provide a password at sign-in.
3737

@@ -41,7 +41,7 @@ To get started with passwordless sign-in, see [Enable passwordless sign-in with
4141

4242
The Authenticator app can help prevent unauthorized access to accounts and stop fraudulent transactions by pushing a notification to your smartphone or tablet. Users view the notification, and if it's legitimate, select **Verify**. Otherwise, they can select **Deny**.
4343

44-
![Screenshot of example web browser prompt for Authenticator app notification to complete sign-in process](media/tutorial-enable-azure-mfa/azure-multi-factor-authentication-browser-prompt.png)
44+
![Screenshot of example web browser prompt for Authenticator app notification to complete sign-in process.](media/tutorial-enable-azure-mfa/azure-multi-factor-authentication-browser-prompt.png)
4545

4646
> [!NOTE]
4747
> If your organization has staff working in or traveling to China, the *Notification through mobile app* method on Android devices doesn't work in that country/region as Google play services(including push notifications) are blocked in the region. However iOS notification do work. For Android devices ,alternate authentication methods should be made available for those users.

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/21/2021
9+
ms.date: 10/29/2021
1010

1111
ms.author: justinha
1212
author: justinha
@@ -25,15 +25,15 @@ This authentication technology can be used on any device platform, including mob
2525

2626
People who enabled phone sign-in from the Microsoft Authenticator app see a message that asks them to tap a number in their app. No username or password is asked for. To complete the sign-in process in the app, a user must next take the following actions:
2727

28-
1. Match the number.
29-
2. Choose **Approve**.
30-
3. Provide their PIN or biometric.
28+
1. Type the number they see on the login screen into the Microsoft Authenticator app dialog.
29+
1. Choose **Approve**.
30+
1. Provide their PIN or biometric.
3131

3232
## Prerequisites
3333

3434
To use passwordless phone sign-in with the Microsoft Authenticator app, the following prerequisites must be met:
3535

36-
- Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
36+
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
3737
- Latest version of Microsoft Authenticator installed on devices running iOS 8.0 or greater, or Android 6.0 or greater.
3838
- The device on which the Microsoft Authenticator app is installed must be registered within the Azure AD tenant to an individual user.
3939

@@ -65,7 +65,7 @@ To enable the authentication method for passwordless phone sign-in, complete the
6565
Users register themselves for the passwordless authentication method of Azure AD by using the following steps:
6666

6767
1. Browse to [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo).
68-
1. Sign in, then add the Authenticator app by selecting **Add method > Authenticator app**, then **Add**.
68+
1. Sign in, then click **Add method** > **Authenticator app** > **Add** to add the Authenticator app.
6969
1. Follow the instructions to install and configure the Microsoft Authenticator app on your device.
7070
1. Select **Done** to complete Authenticator configuration.
7171
1. In **Microsoft Authenticator**, choose **Enable phone sign-in** from the drop-down menu for the account registered.
@@ -90,7 +90,7 @@ The first time a user starts the phone sign-in process, the user performs the fo
9090
3. If necessary, selects **Other ways to sign in**.
9191
4. Selects **Approve a request on my Microsoft Authenticator app**.
9292

93-
The user is then presented with a number. The app prompts the user to authenticate by selecting the appropriate number, instead of by entering a password.
93+
The user is then presented with a number. The app prompts the user to authenticate by typing the appropriate number, instead of by entering a password.
9494

9595
After the user has utilized passwordless phone sign-in, the app continues to guide the user through this method. However, the user will see the option to choose another method.
9696

@@ -119,7 +119,7 @@ This logic generally prevents a user in a hybrid tenant from being directed to A
119119

120120
### Azure MFA server
121121

122-
An end user can be enabled for multi-factor authentication (MFA), through an on-premises Azure MFA server. The user can still create and utilize a single passwordless phone sign-in credential.
122+
An end user can be enabled for multifactor authentication (MFA) through an on-premises Azure MFA server. The user can still create and utilize a single passwordless phone sign-in credential.
123123

124124
If the user attempts to upgrade multiple installations (5+) of the Microsoft Authenticator app with the passwordless phone sign-in credential, this change might result in an error.
125125

@@ -138,4 +138,4 @@ To learn about Azure AD authentication and passwordless methods, see the followi
138138

139139
- [Learn how passwordless authentication works](concept-authentication-passwordless.md)
140140
- [Learn about device registration](../devices/overview.md)
141-
- [Learn about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)
141+
- [Learn about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)
Loading

articles/active-directory/conditional-access/location-condition.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 06/21/2021
9+
ms.date: 10/27/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: karenhoran
14-
ms.reviewer: calebb, olhuan
14+
ms.reviewer: calebb, mewal
1515

1616
ms.collection: M365-identity-device-management
1717

@@ -78,7 +78,7 @@ If you select **Determine location by IP address (IPv4 only)**, the system will
7878
> [!NOTE]
7979
> Sign-ins from IPv6 addresses cannot be mapped to countries or regions, and are considered unknown areas. Only IPv4 addresses can be mapped to countries or regions.
8080
81-
If you select **Determine location by GPS coordinates (Preview)**, the user will need to have the Microsoft Authenticator app installed on their mobile device. Every hour, the system will contact the user’s Microsoft Authenticator app to collect the GPS location of the user’s mobile device.
81+
If you select **Determine location by GPS coordinates**, the user will need to have the Microsoft Authenticator app installed on their mobile device. Every hour, the system will contact the user’s Microsoft Authenticator app to collect the GPS location of the user’s mobile device.
8282

8383
The first time the user is required to share their location from the Microsoft Authenticator app, the user will receive a notification in the app. The user will need to open the app and grant location permissions.
8484

-1.22 KB
Loading

0 commit comments

Comments
 (0)