Skip to content

Commit e33a8d6

Browse files
committed
Merge branch 'content-health-1' of https://github.com/cilwerner/azure-docs-pr-CILW into content-health-1
2 parents 63c3273 + 1c51f69 commit e33a8d6

File tree

441 files changed

+5531
-3862
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

441 files changed

+5531
-3862
lines changed

.openpublishing.redirection.baremetal-infrastructure.json

Lines changed: 81 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,87 @@
4949
"source_path": "articles/baremetal-infrastructure/workloads/nc2-public-preview/use-cases-and-supported-scenarios.md",
5050
"redirect_url": "/azure/baremetal-infrastructure/workloads/nc2-on-azure/use-cases-and-supported-scenarios",
5151
"redirect_document_id": false
52-
}
52+
},
53+
{
54+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/concepts-oracle-high-availability.md",
55+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/options-considerations-high-availability.md",
60+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/configure-snapcenter-oracle-baremetal.md",
65+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/create-on-demand-backup-oracle-baremetal.md",
70+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
71+
"redirect_document_id": false
72+
},
73+
{
74+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/netapp-snapcenter-integration-oracle-baremetal.md",
75+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
76+
"redirect_document_id": false
77+
},
78+
{
79+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/oracle-baremetal-architecture.md",
80+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
81+
"redirect_document_id": false
82+
},
83+
{
84+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/oracle-baremetal-ethernet.md",
85+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
86+
"redirect_document_id": false
87+
},
88+
{
89+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/oracle-baremetal-overview.md",
90+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
91+
"redirect_document_id": false
92+
},
93+
{
94+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/oracle-baremetal-patching.md",
95+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
96+
"redirect_document_id": false
97+
},
98+
{
99+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/oracle-baremetal-provision.md",
100+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
101+
"redirect_document_id": false
102+
},
103+
{
104+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/oracle-baremetal-skus.md",
105+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
106+
"redirect_document_id": false
107+
},
108+
{
109+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/oracle-baremetal-storage.md",
110+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
111+
"redirect_document_id": false
112+
},
113+
{
114+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/oracle-high-availability-recovery.md",
115+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
116+
"redirect_document_id": false
117+
},
118+
{
119+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/restore-oracle-database-baremetal.md",
120+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
121+
"redirect_document_id": false
122+
},
123+
{
124+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/set-up-snapcenter-to-route-traffic.md",
125+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
126+
"redirect_document_id": false
127+
},
128+
{
129+
"source_path": "articles/baremetal-infrastructure/workloads/oracle/high-availability-features.md",
130+
"redirect_url": "/azure/virtual-machines/workloads/oracle/oracle-overview",
131+
"redirect_document_id": false
132+
}
53133
]
54134
}
55135

articles/active-directory/authentication/howto-mfaserver-deploy-upgrade.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,32 +1,31 @@
11
---
22
title: Upgrading Azure MFA Server - Azure Active Directory
3-
description: Steps and guidance to upgrade the Azure Multi-Factor Authentication Server to a newer version.
3+
description: Steps and guidance to upgrade the Azure AD Multi-Factor Authentication Server to a newer version.
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 11/12/2018
9+
ms.date: 10/10/2022
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
14-
ms.reviewer: michmcla
14+
ms.reviewer: jpettere
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Upgrade to the latest Azure Multi-Factor Authentication Server
18+
# Upgrade to the latest Azure AD Multi-Factor Authentication Server
1919

20-
This article walks you through the process of upgrading Azure Multi-Factor Authentication (MFA) Server v6.0 or higher. If you need to upgrade an old version of the PhoneFactor Agent, refer to [Upgrade the PhoneFactor Agent to Azure Multi-Factor Authentication Server](howto-mfaserver-deploy-upgrade-pf.md).
20+
This article walks you through the process of upgrading Azure AD Multi-Factor Authentication (MFA) Server v6.0 or higher. If you need to upgrade an old version of the PhoneFactor Agent, refer to [Upgrade the PhoneFactor Agent to Azure AD Multi-Factor Authentication Server](howto-mfaserver-deploy-upgrade-pf.md).
2121

2222
If you're upgrading from v6.x or older to v7.x or newer, all components change from .NET 2.0 to .NET 4.5. All components also require Microsoft Visual C++ 2015 Redistributable Update 1 or higher. The MFA Server installer installs both the x86 and x64 versions of these components if they aren't already installed. If the User Portal and Mobile App Web Service run on separate servers, you need to install those packages before upgrading those components. You can search for the latest Microsoft Visual C++ 2015 Redistributable update on the [Microsoft Download Center](https://www.microsoft.com/download/).
2323

2424
> [!IMPORTANT]
25-
> As of July 1, 2019, Microsoft no longer offers MFA Server for new deployments. New customers that want to require multi-factor authentication (MFA) during sign-in events should use cloud-based Azure AD Multi-Factor Authentication.
26-
>
25+
> In September 2022, Microsoft announced deprecation of Azure AD Multi-Factor Authentication Server. Beginning September 30, 2024, Azure AD Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md) to the cloud-based Azure MFA service by using the latest Migration Utility included in the most recent [Azure MFA Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure MFA Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
26+
2727
> To get started with cloud-based MFA, see [Tutorial: Secure user sign-in events with Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
28-
>
29-
> Existing customers that activated MFA Server before July 1, 2019 can download the latest version, future updates, and generate activation credentials as usual.
28+
3029

3130
Upgrade steps at a glance:
3231

@@ -36,7 +35,7 @@ Upgrade steps at a glance:
3635

3736
## Upgrade Azure MFA Server
3837

39-
1. Use the instructions in [Download the Azure Multi-Factor Authentication Server](howto-mfaserver-deploy.md#download-the-mfa-server) to get the latest version of the Azure MFA Server installer.
38+
1. Use the instructions in [Download the Azure AD Multi-Factor Authentication Server](howto-mfaserver-deploy.md#download-the-mfa-server) to get the latest version of the Azure MFA Server installer.
4039
2. Make a backup of the MFA Server data file located at C:\Program Files\Multi-Factor Authentication Server\Data\PhoneFactor.pfdata (assuming the default install location) on your primary MFA Server.
4140
3. If you run multiple servers for high availability, change the client systems that authenticate to the MFA Server so that they stop sending traffic to the servers that are upgrading. If you use a load balancer, remove a subordinate MFA Server from the load balancer, do the upgrade, and then add the server back into the farm.
4241
4. Run the new installer on each MFA Server. Upgrade subordinate servers first because they can read the old data file being replicated by the primary.
@@ -113,7 +112,7 @@ These instructions only apply if you run Multi-Factor Authentication Server sepa
113112

114113
## Next steps
115114

116-
* Get examples of [Advanced scenarios with Azure Multi-Factor Authentication and third-party VPNs](howto-mfaserver-nps-vpn.md)
115+
* Get examples of [Advanced scenarios with Azure AD Multi-Factor Authentication and third-party VPNs](howto-mfaserver-nps-vpn.md)
117116

118117
* [Synchronize MFA Server with Windows Server Active Directory](howto-mfaserver-dir-ad.md)
119118

articles/active-directory/develop/configure-token-lifetimes.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,29 +9,30 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/08/2021
12+
ms.date: 10/17/2022
1313
ms.author: ryanwi
14-
ms.custom: aaddev, contperf-fy21q1
14+
ms.custom: identityplatformtop40, contperf-fy21q2, engagement-fy23
1515
ms.reviewer: ludwignick, jlu, annaba
1616
---
1717
# Configure token lifetime policies (preview)
18-
You can specify the lifetime of an access, SAML, or ID token issued by Microsoft identity platform. You can set token lifetimes for all apps in your organization, for a multi-tenant (multi-organization) application, or for a specific service principal in your organization. For more info, read [configurable token lifetimes](active-directory-configurable-token-lifetimes.md).
1918

20-
In this section, we walk through a common policy scenario that can help you impose new rules for token lifetime. In the example, you learn how to create a policy that requires users to authenticate more frequently in your web app.
19+
In the following steps, you'll implement a common policy scenario that imposes new rules for token lifetime. It's possible to specify the lifetime of an access, SAML, or ID token issued by the Microsoft identity platform. This can be set for all apps in your organization or for a specific service principal. They can also be set for multi-organizations (multi-tenant application).
20+
21+
For more information, see [configurable token lifetimes](active-directory-configurable-token-lifetimes.md).
2122

2223
## Get started
2324

2425
To get started, download the latest [Azure AD PowerShell Module Public Preview release](https://www.powershellgallery.com/packages/AzureADPreview).
2526

26-
Next, run the `Connect` command to sign in to your Azure AD admin account. Run this command each time you start a new session.
27+
Next, run the `Connect-AzureAD` command to sign in to your Azure Active Directory (Azure AD) admin account. Run this command each time you start a new session.
2728

2829
```powershell
2930
Connect-AzureAD -Confirm
3031
```
3132

3233
## Create a policy for web sign-in
3334

34-
In this example, you create a policy that requires users to authenticate more frequently in your web app. This policy sets the lifetime of the access/ID tokens to the service principal of your web app.
35+
In the following steps, you'll create a policy that requires users to authenticate more frequently in your web app. This policy sets the lifetime of the access/ID tokens to the service principal of your web app.
3536

3637
1. Create a token lifetime policy.
3738

@@ -73,7 +74,7 @@ To see all policies that have been created in your organization, run the [Get-Az
7374
Get-AzureADPolicy -All $true
7475
```
7576

76-
To see which apps and service principals are linked to a specific policy you identified run the following [Get-AzureADPolicyAppliedObject](/powershell/module/azuread/get-azureadpolicyappliedobject?view=azureadps-2.0-preview&preserve-view=true) cmdlet by replacing **1a37dad8-5da7-4cc8-87c7-efbc0326cf20** with any of your policy IDs. Then you can decide whether to configure Conditional Access sign-in frequency or remain with the Azure AD defaults.
77+
To see which apps and service principals are linked to a specific policy that you identified, run the following [`Get-AzureADPolicyAppliedObject`](/powershell/module/azuread/get-azureadpolicyappliedobject?view=azureadps-2.0-preview&preserve-view=true) cmdlet by replacing `1a37dad8-5da7-4cc8-87c7-efbc0326cf20` with any of your policy IDs. Then you can decide whether to configure Conditional Access sign-in frequency or remain with the Azure AD defaults.
7778

7879
```powershell
7980
Get-AzureADPolicyAppliedObject -id 1a37dad8-5da7-4cc8-87c7-efbc0326cf20
@@ -82,7 +83,7 @@ Get-AzureADPolicyAppliedObject -id 1a37dad8-5da7-4cc8-87c7-efbc0326cf20
8283
If your tenant has policies which define custom values for the refresh and session token configuration properties, Microsoft recommends you update those policies to values that reflect the defaults described above. If no changes are made, Azure AD will automatically honor the default values.
8384

8485
### Troubleshooting
85-
Some users have reported a `Get-AzureADPolicy : The term 'Get-AzureADPolicy' is not recognized` error after running the `Get-AzureADPolicy` cmdlet. As a workaround, run the following to uninstall/re-install the AzureAD module and then install the AzureADPreview module:
86+
Some users have reported a `Get-AzureADPolicy : The term 'Get-AzureADPolicy' is not recognized` error after running the `Get-AzureADPolicy` cmdlet. As a workaround, run the following to uninstall/re-install the AzureAD module, and then install the AzureADPreview module:
8687

8788
```powershell
8889
# Uninstall the AzureAD Module

0 commit comments

Comments
 (0)