Skip to content

Commit da2d11e

Browse files
authored
Merge pull request #211430 from MicrosoftDocs/main
9/15 AM Publish
2 parents f6f7422 + e84ca57 commit da2d11e

File tree

57 files changed

+851
-150
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

57 files changed

+851
-150
lines changed

articles/active-directory-b2c/add-api-connector-token-enrichment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ Content-type: application/json
144144
| -------------------------------------------------- | ----------------- | -------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
145145
| version | String | Yes | The version of your API. |
146146
| action | String | Yes | Value must be `Continue`. |
147-
| \<builtInUserAttribute> | \<attribute-type> | No | They can returned in the token if selected as an **Application claim**. |
147+
| \<builtInUserAttribute> | \<attribute-type> | No | They can be returned in the token if selected as an **Application claim**. |
148148
| \<extension\_{extensions-app-id}\_CustomAttribute> | \<attribute-type> | No | The claim does not need to contain `_<extensions-app-id>_`, it is *optional*. They can returned in the token if selected as an **Application claim**. |
149149

150150
::: zone-end

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/13/2022
9+
ms.date: 09/15/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -179,7 +179,7 @@ Here are some factors for you to consider when choosing Microsoft passwordless t
179179

180180
||**Windows Hello for Business**|**Passwordless sign-in with the Authenticator app**|**FIDO2 security keys**|
181181
|:-|:-|:-|:-|
182-
|**Pre-requisite**| Windows 10, version 1809 or later<br>Azure Active Directory| Authenticator app<br>Phone (iOS and Android devices running Android 8.0 or above.)|Windows 10, version 1903 or later<br>Azure Active Directory|
182+
|**Pre-requisite**| Windows 10, version 1809 or later<br>Azure Active Directory| Authenticator app<br>Phone (iOS and Android devices)|Windows 10, version 1903 or later<br>Azure Active Directory|
183183
|**Mode**|Platform|Software|Hardware|
184184
|**Systems and devices**|PC with a built-in Trusted Platform Module (TPM)<br>PIN and biometrics recognition |PIN and biometrics recognition on phone|FIDO2 security devices that are Microsoft compatible|
185185
|**User experience**|Sign in using a PIN or biometric recognition (facial, iris, or fingerprint) with Windows devices.<br>Windows Hello authentication is tied to the device; the user needs both the device and a sign-in component such as a PIN or biometric factor to access corporate resources.|Sign in using a mobile phone with fingerprint scan, facial or iris recognition, or PIN.<br>Users sign in to work or personal account from their PC or mobile phone.|Sign in using FIDO2 security device (biometrics, PIN, and NFC)<br>User can access device based on organization controls and authenticate based on PIN, biometrics using devices such as USB security keys and NFC-enabled smartcards, keys, or wearables.|

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: how-to
10-
ms.date: 09/13/2022
10+
ms.date: 09/15/2022
1111

1212

1313
ms.author: justinha
@@ -48,7 +48,7 @@ The Azure AD accounts can be in the same tenant or different tenants. Guest acco
4848
To use passwordless phone sign-in with Microsoft Authenticator, the following prerequisites must be met:
4949

5050
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
51-
- Latest version of Microsoft Authenticator installed on devices running iOS 12.0 or greater, or Android 8.0 or greater.
51+
- Latest version of Microsoft Authenticator installed on devices running iOS or Android.
5252
- For Android, the device that runs Microsoft Authenticator must be registered to an individual user. We're actively working to enable multiple accounts on Android.
5353
- For iOS, the device must be registered with each tenant where it's used to sign in. For example, the following device must be registered with Contoso and Wingtiptoys to allow all accounts to sign in:
5454

articles/active-directory/managed-identities-azure-resources/how-to-view-associated-resources-for-an-identity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ https://management.azure.com/subscriptions/{resourceID of user-assigned identity
6464

6565
| Parameter | Example |Description |
6666
|---|---|---|
67-
| $filter | ```'type' eq 'microsoft.cognitiveservices/account' and contains(name, 'test')``` | An OData expression that allows you to filter any of the available fields: name, type, resourceGroup, subscriptionId, subscriptionDisplayName<br/><br/>The following operations are supported: ```and```, ```or```, ```eq``` and ```contains``` |
67+
| $filter | ```type eq 'microsoft.cognitiveservices/account' and contains(name, 'test')``` | An OData expression that allows you to filter any of the available fields: name, type, resourceGroup, subscriptionId, subscriptionDisplayName<br/><br/>The following operations are supported: ```and```, ```or```, ```eq``` and ```contains``` |
6868
| $orderby | ```name asc``` | An OData expression that allows you to order by any of the available fields |
6969
| $skip | 50 | The number of items you want to skip while paging through the results. |
7070
| $top | 10 | The number of resources to return. 0 will return only a count of the resources. |

articles/active-directory/saas-apps/jiramicrosoft-tutorial.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,37 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
118118

119119
![The Certificate download link](common/copy-metadataurl.png)
120120

121+
122+
123+
124+
1. The Name ID attribute in Azure AD can be mapped to any desired user attribute by editing the Attributes & Claims section.
125+
126+
> [!div class="mx-imgBorder"]
127+
> ![Screenshot showing how to edit Attributes and Claims.](common/edit-attribute.png)
128+
129+
a. After clicking on Edit, any desired user attribute can be mapped by clicking on Unique User Identifier (Name ID).
130+
131+
> [!div class="mx-imgBorder"]
132+
> ![Screenshot showing the NameID in Attributes and Claims.](common/attribute-nameID.png)
133+
134+
b. On the next screen, the desired attribute name like user.userprincipalname can be selected as an option from the Source Attribute dropdown menu.
135+
136+
> [!div class="mx-imgBorder"]
137+
> ![Screenshot showing how to select Attributes and Claims.](common/attribute-select.png)
138+
139+
c. The selection can then be saved by clicking on the Save button at the top.
140+
141+
> [!div class="mx-imgBorder"]
142+
> ![Screenshot showing how to save Attributes and Claims.](common/attribute-save.png)
143+
144+
d. Now, the user.userprincipalname attribute source in Azure AD is mapped to the Name ID attribute name in Azure AD which will be compared with the username attribute in Atlassian by the SSO plugin.
145+
146+
> [!div class="mx-imgBorder"]
147+
> ![Screenshot showing how to review Attributes and Claims.](common/attribute-review.png)
148+
149+
> [!NOTE]
150+
> The SSO service provided by Microsoft Azure supports SAML authentication which is able to perform user identification using different attributes such as givenname (first name), surname (last name), email (email address), and user principal name (username). We recommend not to use email as an authentication attribute as email addresses are not always verified by Azure AD. The plugin compares the values of Atlassian username attribute with the NameID attribute in Azure AD in order to determine the valid user authentication.
151+
121152
### Create an Azure AD test user
122153

123154
In this section, you'll create a test user in the Azure portal called B.Simon.

articles/active-directory/verifiable-credentials/admin-api.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,9 @@ Content-type: application/json
5959
6060
{
6161
"id": "f5bf2fc6-7135-4d94-a6fe-c26e4543bc5a",
62-
"servicePrincipal": "90e10a26-94cd-49d6-8cd7-cacb10f00686",
62+
"verifiableCredentialServicePrincipalId": "90e10a26-94cd-49d6-8cd7-cacb10f00686",
63+
"verifiableCredentialRequestServicePrincipalId": "870e10a26-94cd-49d6-8cd7-cacb10f00fe",
64+
"verifiableCredentialAdminServicePrincipalId": "760e10a26-94cd-49d6-8cd7-cacb10f00ab",
6365
"status": "Enabled"
6466
}
6567
```

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,8 @@ The following diagram illustrates the Verified ID architecture and the component
3535
## Prerequisites
3636

3737
- You need an Azure tenant with an active subscription. If you don't have Azure subscription, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
38-
- Ensure that you have the [global administrator](../../active-directory/roles/permissions-reference.md#global-administrator) permission for the directory you want to configure.
38+
- Ensure that you have the [global administrator](../../active-directory/roles/permissions-reference.md#global-administrator) or the [authentication policy administrator](../../active-directory/roles/permissions-reference.md#authentication-policy-administrator) permission for the directory you want to configure. If you're not the global administrator, you will need permission [application administrator](../../active-directory/roles/permissions-reference.md#application-administrator) to complete the app registration including granting admin consent.
39+
- Ensure that you have the [contributor](../../role-based-access-control/built-in-roles.md#contributor) role for the Azure subscription or the resource group that you will deploy Azure Key Vault in.
3940

4041
## Create a key vault
4142

@@ -138,7 +139,7 @@ To add the required permissions, follow these steps:
138139

139140
1. Select **APIs my organization uses**.
140141

141-
1. Search for the **Verifiable Credentials Service Request** service principal, and select it.
142+
1. Search for the **Verifiable Credentials Service Request** and **Verifiable Credentials Service** service principals, and select them.
142143

143144
![Screenshot that shows how to select the service principal.](media/verifiable-credentials-configure-tenant/add-app-api-permissions-select-service-principal.png)
144145

articles/aks/update-credentials.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ SP_ID=$(az aks show --resource-group myResourceGroup --name myAKSCluster \
5555
With a variable set that contains the service principal ID, now reset the credentials using [az ad sp credential reset][az-ad-sp-credential-reset]. The following example lets the Azure platform generate a new secure secret for the service principal. This new secure secret is also stored as a variable.
5656

5757
```azurecli-interactive
58-
SP_SECRET=$(az ad sp credential reset --name "$SP_ID" --query password -o tsv)
58+
SP_SECRET=$(az ad sp credential reset --id "$SP_ID" --query password -o tsv)
5959
```
6060

6161
Now continue on to [update AKS cluster with new service principal credentials](#update-aks-cluster-with-new-service-principal-credentials). This step is necessary for the Service Principal changes to reflect on the AKS cluster.
@@ -141,4 +141,4 @@ In this article, the service principal for the AKS cluster itself and the Azure
141141
[az-ad-sp-credential-list]: /cli/azure/ad/sp/credential#az_ad_sp_credential_list
142142
[az-ad-sp-credential-reset]: /cli/azure/ad/sp/credential#az_ad_sp_credential_reset
143143
[node-image-upgrade]: ./node-image-upgrade.md
144-
[node-surge-upgrade]: upgrade-cluster.md#customize-node-surge-upgrade
144+
[node-surge-upgrade]: upgrade-cluster.md#customize-node-surge-upgrade

articles/app-service/deploy-azure-pipelines.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ The code examples in this section assume you are deploying an ASP.NET web app. Y
3737

3838
Learn more about [Azure Pipelines ecosystem support](/azure/devops/pipelines/ecosystems/ecosystems).
3939

40-
# [Classic](#tab/yaml/)
40+
# [YAML](#tab/yaml/)
4141

4242
1. Sign in to your Azure DevOps organization and navigate to your project.
4343

articles/app-service/manage-custom-dns-buy-domain.md

Lines changed: 5 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -183,39 +183,27 @@ To test the custom domain, navigate to it in the browser.
183183

184184
## Renew the domain
185185

186-
The App Service domain you bought is valid for one year from the time of purchase. By default, the domain is configured to renew automatically by charging your payment method for the next year. You can manually renew your domain name.
186+
The App Service domain you bought is valid for one year from the time of purchase. You can configure to renew your domain automatically which will charge your payment method when your domain renews the following year. You can also manually renew your domain name.
187187

188-
If you want to turn off automatic renewal, or if you want to manually renew your domain, follow the steps here.
188+
If you want to configure automatic renewal, or if you want to manually renew your domain, follow the steps here.
189189

190190
1. In the search bar, search for and select **App Service Domains**.
191191

192192
![Portal navigation to Azure App Service domains](./media/app-service-web-tutorial-custom-domain/view-app-service-domains.png)
193193

194194
1. In the **App Service Domains** section, select the domain you want to configure.
195195

196-
1. From the left navigation of the domain, select **Domain renewal**. To stop renewing your domain automatically, select **Off**. The setting takes effect immediately.
196+
1. From the left navigation of the domain, select **Domain renewal**. To start renewing your domain automatically, select **On**, otherwise select **Off**. The setting takes effect immediately. If automatic renewal is enabled, on the day after your domain expiration date, Azure attempts to bill you for the domain name renewal.
197197

198198
![Screenshot that shows the option to automatically renew your domain.](./media/custom-dns-web-site-buydomains-web-app/dncmntask-cname-buydomains-autorenew.png)
199199

200200
> [!NOTE]
201201
> When navigating away from the page, disregard the "Your unsaved edits will be discarded" error by clicking **OK**.
202202
>
203203
204-
To manually renew your domain, select **Renew domain**. However, this button is not active until [90 days before the domain's expiration](#when-domain-expires).
204+
To manually renew your domain, select **Renew domain**. However, this button is not active until 90 days before the domain's expiration date.
205205

206-
If your domain renewal is successful, you receive an email notification within 24 hours.
207-
208-
## When domain expires
209-
210-
Azure deals with expiring or expired App Service domains as follows:
211-
212-
* If automatic renewal is disabled: 90 days before domain expiration, a renewal notification email is sent to you and the **Renew domain** button is activated in the portal.
213-
* If automatic renewal is enabled: On the day after your domain expiration date, Azure attempts to bill you for the domain name renewal.
214-
* If an error occurs during automatic renewal (for example, your card on file is expired), or if automatic renewal is disabled and you allow the domain to expire, Azure notifies you of the domain expiration and parks your domain name. You can [manually renew](#renew-the-domain) your domain.
215-
* On the 4th and 12th days day after expiration, Azure sends you additional notification emails. You can [manually renew](#renew-the-domain) your domain. On the 5th day after expiration, DNS resolution stops for the expired domain.
216-
* On the 19th day after expiration, your domain remains on hold but becomes subject to a redemption fee. You can call customer support to renew your domain name, subject to any applicable renewal and redemption fees.
217-
* On the 25th day after expiration, Azure puts your domain up for auction with a domain name industry auction service. You can call customer support to renew your domain name, subject to any applicable renewal and redemption fees.
218-
* On the 30th day after expiration, you're no longer able to redeem your domain.
206+
If your domain renewal is successful, you receive an email notification within 24 hours.
219207

220208
<a name="custom"></a>
221209

0 commit comments

Comments
 (0)