Skip to content

Commit e386acc

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 0f2b3bc + a53359e commit e386acc

File tree

137 files changed

+592
-393
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

137 files changed

+592
-393
lines changed

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Registration features for passwordless authentication methods rely on the combin
4343
### Enable passwordless phone sign-in authentication methods
4444

4545
1. Sign in to the [Azure portal](https://portal.azure.com)
46-
1. Browse to **Azure AD Security** > **Authentication methods** > **Authentication method policy (Preview)**
46+
1. Search for and select *Azure Active Directory*. Select **Security** > **Authentication methods** > **Authentication method policy (Preview)**
4747
1. Under **Passwordless phone sign-in**, choose the following options
4848
1. **Enable** - Yes or No
4949
1. **Target** - All users or Select users

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ All users start out *Disabled*. When you enroll users in Azure MFA, their state
5353
Use the following steps to access the page where you can view and manage user states:
5454

5555
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
56-
2. Go to **Azure Active Directory** > **Users and groups** > **All users**.
56+
2. Search for and select *Azure Active Directory*. Select **Users** > **All users**.
5757
3. Select **Multi-Factor Authentication**.
5858
![Select Multi-Factor Authentication](./media/howto-mfa-userstates/selectmfa.png)
5959
4. A new page that displays the user states opens.

articles/active-directory/authentication/howto-mfaserver-deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ If you aren't using the Event Confirmation feature, and your users aren't using
9999
Follow these steps to download the Azure Multi-Factor Authentication Server from the Azure portal:
100100

101101
1. Sign in to the [Azure portal](https://portal.azure.com) as an administrator.
102-
2. Select **Azure Active Directory** > **MFA Server**.
102+
2. Search for and select *Azure Active Directory*. Select **MFA Server**.
103103
3. Select **Server settings**.
104104
4. Select **Download** and follow the instructions on the download page to save the installer.
105105

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,8 @@ Based on your organizational requirements, smart lockout values may need to be c
6464

6565
To check or modify the smart lockout values for your organization, use the following steps:
6666

67-
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Active Directory** > **Authentication methods** > **Password protection**.
67+
1. Sign in to the [Azure portal](https://portal.azure.com).
68+
1. Search for and select *Azure Active Directory*. Select **Authentication methods** > **Password protection**.
6869
1. Set the **Lockout threshold**, based on how many failed sign-ins are allowed on an account before its first lockout. The default is 10.
6970
1. Set the **Lockout duration in seconds**, to the length in seconds of each lockout. The default is 60 seconds (one minute).
7071

articles/active-directory/devices/assign-local-admin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ To view and update the membership of the global administrator role, see:
4747
In the Azure portal, you can manage the device administrator role on the **Devices** page. To open the **Devices** page:
4848

4949
1. Sign in to your [Azure portal](https://portal.azure.com) as a global administrator or device administrator.
50-
1. On the left navbar, click **Azure Active Directory**.
50+
1. Search for and select *Azure Active Directory*.
5151
1. In the **Manage** section, click **Devices**.
5252
1. On the **Devices** page, click **Device settings**.
5353

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,8 @@ There are many benefits of using Azure AD authentication to log in to Windows VM
3131
- Azure RBAC allows you to grant the appropriate access to VMs based on need and remove it when it is no longer needed.
3232
- Before allowing access to a VM, Azure AD Conditional Access can enforce additional requirements such as:
3333
- Multi-factor authentication
34-
- Sign-in risk
35-
- Automate and scale Azure AD join for Azure based Windows VMs.
34+
- Sign-in risk check
35+
- Automate and scale Azure AD join of Azure Windows VMs that are part for your VDI deployments.
3636

3737
## Requirements
3838

@@ -65,7 +65,7 @@ To use Azure AD login in for Windows VM in Azure, you need to first enable Azure
6565
There are multiple ways you can enable Azure AD login for your Windows VM:
6666

6767
- Using the Azure portal experience when creating a Windows VM
68-
- Using the Azure Cloud Shell experience when creating a Windows VM or for an existing Windows VM
68+
- Using the Azure Cloud Shell experience when creating a Windows VM **or for an existing Windows VM**
6969

7070
### Using Azure portal create VM experience to enable Azure AD login
7171

@@ -184,6 +184,14 @@ For more information on how to use RBAC to manage access to your Azure subscript
184184
- [Manage access to Azure resources using RBAC and the Azure portal](https://docs.microsoft.com/azure/role-based-access-control/role-assignments-portal)
185185
- [Manage access to Azure resources using RBAC and Azure PowerShell](https://docs.microsoft.com/azure/role-based-access-control/role-assignments-powershell).
186186

187+
## Using Conditional Access
188+
189+
You can enforce Conditional Access policies such as multi-factor authentication or user sign-in risk check before authorizing access to Windows VMs in Azure that are enabled with Azure AD sign in. To apply Conditional Access policy, you must select "Azure Windows VM Sign-In" app from the cloud apps or actions assignment option and then use Sign-in risk as a condition and/or
190+
require multi-factor authentication as a grant access control.
191+
192+
> [!NOTE]
193+
> If you use "Require multi-factor authentication" as a grant access control for requesting access to "Azure Windows VM Sign-In" app, then you must supply multi-factor authentication claim as part of the client that initiates the RDP session to the target Windows VM in Azure. The only way to achieve this on a Windows 10 client is to use Windows Hello for Business PIN or biometric auth during RDP. Biometric auth for RDP is supported starting Windows 10 1809. Using Windows Hello for Business auth during RDP is only available for deployments that use cert trust model and currently not available for key trust model.
194+
187195
## Log in using Azure AD credentials to a Windows VM
188196

189197
> [!IMPORTANT]
@@ -334,7 +342,10 @@ If you see the following error message when you initiate a remote desktop connec
334342

335343
![The sign-in method you're trying to use isn't allowed.](./media/howto-vm-sign-in-azure-ad-windows/mfa-sign-in-method-required.png)
336344

337-
If you have configured a Conditional Access policy that requires MFA to be done before you can access the RBAC resource, then you need to ensure that the Windows 10 PC initiating the remote desktop connection to your VM signs in using a strong authentication method such as Windows Hello. If you do not use a strong authentication method for your remote desktop connection, you will see the following error.
345+
If you have configured a Conditional Access policy that requires MFA to be done before you can access the RBAC resource, then you need to ensure that the Windows 10 PC initiating the remote desktop connection to your VM signs in using a strong authentication method such as Windows Hello. If you do not use a strong authentication method for your remote desktop connection, you will see the following error. If you have not deployed Windows Hello for Business and if that is not an option for now, you can exlcude MFA requirement by configuring Conditional Access policy that excludes "Azure Windows VM Sign-In" app from the list of cloud apps that require MFA. To learn more about Windows Hello for Business, see [Windows Hello for Business Overview] (https://docs.microsoft.com/en-us/windows/security/identity-protection/hello-for-business/hello-identity-verification).
346+
347+
> [!NOTE]
348+
> Windows Hello for Business PIN auth during RDP has been supported for long now, however using Biometric auth for RDP is supported starting Windows 10 1809. Using Windows Hello for Business auth during RDP is only available for deployments that use cert trust model and currently not available for key trust model.
338349
339350
## Preview feedback
340351

articles/active-directory/manage-apps/access-panel-extension-problem-installing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Install the application access panel browser extension - Azure | Microsoft Docs
2+
title: Install application access panel browser extension - Azure AD
33
description: Fix common errors encountered when you install the access panel browser extension.
44
services: active-directory
55
documentationcenter: ''

articles/active-directory/manage-apps/application-provisioning-config-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to configure user provisioning to an Azure AD Gallery application | Microsoft Docs
2+
title: How to configure user provisioning to an Azure AD Gallery app
33
description: How you can quickly configure rich user account provisioning and deprovisioning to applications already listed in the Azure AD Application Gallery
44
services: active-directory
55
documentationcenter: ''

articles/active-directory/manage-apps/application-provisioning-config-problem-no-users-provisioned.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: No users are being provisioned to an Azure AD Gallery application | Microsoft Docs
2+
title: No users are being provisioned to an Azure AD Gallery application
33
description: How to troubleshoot common issues faced when you don't see users appearing in an Azure AD Gallery Application you have configured for user provisioning with Azure AD
44
services: active-directory
55
documentationcenter: ''

articles/active-directory/manage-apps/application-provisioning-config-problem-scim-compatibility.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Known issues and resolutions with SCIM 2.0 protocol compliance of the Azure AD User Provisioning service | Microsoft Docs
2+
title: Known issues with SCIM 2.0 protocol compliance - Azure AD
33
description: How to solve common protocol compatibility issues faced when adding a non-gallery application that supports SCIM 2.0 to Azure AD
44
services: active-directory
55
documentationcenter: ''

0 commit comments

Comments
 (0)