Skip to content

Commit e40d282

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into postgres-app
2 parents cb47ef3 + 17a56c9 commit e40d282

File tree

1,004 files changed

+13640
-9067
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,004 files changed

+13640
-9067
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42218,6 +42218,26 @@
4221842218
"redirect_url": "/azure/iot-central/preview/quick-monitor-devices/",
4221942219
"redirect_document_id": true
4222042220
},
42221+
{
42222+
"source_path": "articles/iot-pnp/quickstart-connect-pnp-device-linux.md",
42223+
"redirect_url": "/azure/iot-pnp/quickstart-connect-pnp-device-c-linux/",
42224+
"redirect_document_id": true
42225+
},
42226+
{
42227+
"source_path": "articles/iot-pnp/quickstart-connect-pnp-device.md",
42228+
"redirect_url": "/azure/iot-pnp/quickstart-connect-pnp-device-c-windows/",
42229+
"redirect_document_id": true
42230+
},
42231+
{
42232+
"source_path": "articles/iot-pnp/quickstart-connect-pnp-device-solution.md",
42233+
"redirect_url": "/azure/iot-pnp/quickstart-connect-pnp-device-solution-node/",
42234+
"redirect_document_id": true
42235+
},
42236+
{
42237+
"source_path": "articles/iot-pnp/quickstart-create-pnp-device.md",
42238+
"redirect_url": "/azure/iot-pnp/quickstart-create-pnp-device-windows/",
42239+
"redirect_document_id": true
42240+
},
4222142241
{
4222242242
"source_path": "articles/iot-central/core/overview-iot-options.md",
4222342243
"redirect_url": "/azure/iot-fundamentals/iot-services-and-technologies/",

articles/active-directory-b2c/page-layout.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 07/04/2019
11+
ms.date: 12/18/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -42,9 +42,9 @@ In your custom policies, you may have [ContentDefinitions](contentdefinitions.md
4242
</ContentDefinition>
4343
```
4444

45-
To select a page layout, you change the **DataUri** values in your [ContentDefinitions](contentdefinitions.md) in your policies. By switching from the old **DataUri** values to the new values, you're selecting an immutable package. The benefit of using this package is that you’ll know it won't change and cause unexpected behavior on your page.
45+
To select a page layout, you change the **DataUri** values in your [ContentDefinitions](contentdefinitions.md) in your policies. By switching from the old **DataUri** values to the new values, you're selecting an immutable package. The benefit of using this package is that you know it won't change and cause unexpected behavior on your page.
4646

47-
To set up a page layout, use the following table to find **DataUri** values.
47+
To specify a page layout in your custom policies that use an old **DataUri** value, insert `contract` between `elements` and the page type (for example, `selfasserted`), and specify the version number. For example:
4848

4949
| Old DataUri value | New DataUri value |
5050
| ----------------- | ----------------- |
@@ -64,17 +64,23 @@ To set up a page layout, use the following table to find **DataUri** values.
6464

6565
Page layout packages are periodically updated to include fixes and improvements in their page elements. The following change log specifies the changes introduced in each version.
6666

67-
### 1.2.0
67+
### 2.0.0
68+
69+
- Self-asserted page (`selfasserted`)
70+
- Added support for [display controls](display-controls.md) in custom policies.
71+
72+
### 1.2.0
73+
6874
- All pages
6975
- Accessibility fixes
7076
- You can now add the `data-preload="true"` attribute in your HTML tags to control the load order for CSS and JavaScript. Scenarios include:
71-
- Use this on your CSS link to load the CSS at the same time as your HTML so that it doesn't 'flicker' between loading the files
72-
- This attribute allows you to control the order in which your Script tags are fetched and executed before the page load
77+
- Use this on your CSS link to load the CSS at the same time as your HTML so that it doesn't 'flicker' between loading the files
78+
- This attribute allows you to control the order in which your Script tags are fetched and executed before the page load
7379
- Email field is now `type=email` and mobile keyboards will provide the correct suggestions
7480
- Support for Chrome translate
7581
- Unified and self-asserted page
7682
- The username/email and password fields now use the form HTML element. This will now allow Edge and IE to properly save this information
77-
83+
7884
### 1.1.0
7985

8086
- Exception page (globalexception)

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Before enabling the new experience, review the article [Combined security inform
3636
Complete these steps to enable combined registration:
3737

3838
1. Sign in to the Azure portal as a user administrator or global administrator.
39-
2. Go to **Azure Active Directory** > **User settings** > **Manage settings for access panel preview features**.
39+
2. Go to **Azure Active Directory** > **User settings** > **Manage user feature preview settings**.
4040
3. Under **Users can use preview features for registering and managing security info**, choose to enable for a **Selected** group of users or for **All** users.
4141

4242
![Enable the combined security info preview experience for All users](media/howto-registration-mfa-sspr-combined/enable-the-combined-security-info-preview.png)
@@ -63,7 +63,7 @@ The following policy applies to all selected users, who attempt to register usin
6363

6464
![Create a CA policy to control security info registration](media/howto-registration-mfa-sspr-combined/require-registration-from-trusted-location.png)
6565

66-
1. In the **Azure portal**, browse to **Azure Active Directory** > **Conditional Access**
66+
1. In the **Azure portal**, browse to **Azure Active Directory** > **Security** > **Conditional Access**
6767
1. Select **New policy**
6868
1. In Name, Enter a Name for this policy. For example, **Combined Security Info Registration on Trusted Networks**
6969
1. Under **Assignments**, click **Users and groups**, and select the users and groups you want this policy to apply to

articles/active-directory/conditional-access/concept-baseline-protection.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 12/17/2019
9+
ms.date: 12/18/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -37,6 +37,10 @@ There are four baseline policies:
3737

3838
All four of these policies will impact legacy authentication flows like POP, IMAP, and older Office desktop clients.
3939

40+
### Exclusions
41+
42+
When baseline policies went into their initial public preview, there was an option to exclude users from the policies. This capability evolved through the preview and was removed in July of 2019. Organizations who had already created exclusions were able to continue to keep them new users were unable to add exclusions to the policies.
43+
4044
### Require MFA for admins (preview)
4145

4246
Due to the power and access that administrator accounts have, you should treat them with special care. One common method to improve the protection of privileged accounts is to require a stronger form of account verification when they are used to sign in. In Azure Active Directory, you can get a stronger account verification by requiring administrators to register for and use Azure Multi-Factor Authentication.
@@ -60,8 +64,8 @@ High privileged administrators aren’t the only ones targeted in attacks. Bad a
6064

6165
**End user protection (preview)** is a baseline policy that protects all users in a directory. Enabling this policy requires all users to register for Azure Multi-Factor Authentication within 14 days. Once registered, users will be prompted for MFA only during risky sign-in attempts. Compromised user accounts are blocked until password reset and risk dismissal.
6266

63-
[!NOTE]
64-
Any users previously flagged for risk are blocked until password reset and risk dismissal upon policy activation.
67+
> [!NOTE]
68+
> Any users previously flagged for risk are blocked until password reset and risk dismissal upon policy activation.
6569
6670
### Block legacy authentication (preview)
6771

articles/active-directory/conditional-access/controls.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: article
9-
ms.date: 11/21/2019
9+
ms.date: 12/20/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -112,7 +112,7 @@ Providers currently offering a compatible service include:
112112
- [Entrust Datacard](https://www.entrustdatacard.com/products/authentication/intellitrust)
113113
- [GSMA](https://mobileconnect.io/azure/)
114114
- [Ping Identity](https://documentation.pingidentity.com/pingid/pingidAdminGuide/index.shtml#pid_c_AzureADIntegration.html)
115-
- RSA
115+
- [RSA](https://community.rsa.com/docs/DOC-81278)
116116
- [SecureAuth](https://docs.secureauth.com/pages/viewpage.action?pageId=47238992#)
117117
- [Silverfort](https://www.silverfort.io/company/using-silverfort-mfa-with-azure-active-directory/)
118118
- [Symantec VIP](https://help.symantec.com/home/VIP_Integrate_with_Azure_AD)

articles/active-directory/conditional-access/howto-conditional-access-policy-block-legacy.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 12/12/2019
9+
ms.date: 12/20/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -31,9 +31,11 @@ The following steps will help create a Conditional Access policy to block legacy
3131
1. Under **Include**, select **All users**.
3232
1. Under **Exclude**, select **Users and groups** and choose any accounts that must maintain the ability to use legacy authentication.
3333
1. Select **Done**.
34+
1. Under **Cloud apps or actions** select **All cloud apps**.
35+
1. Select **Done**.
3436
1. Under **Conditions** > **Client apps (preview)**, set **Configure** to **Yes**.
3537
1. Check only the boxes **Mobile apps and desktop clients** > **Other clients**.
36-
2. Select **Done**.
38+
1. Select **Done**.
3739
1. Under **Access controls** > **Grant**, select **Block access**.
3840
1. Select **Select**.
3941
1. Confirm your settings and set **Enable policy** to **On**.

articles/active-directory/develop/reference-aadsts-error-codes.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: reference
16-
ms.date: 08/30/2019
16+
ms.date: 12/18/2019
1717
ms.author: ryanwi
1818
ms.reviewer: hirsin
1919
ms.custom: aaddev
@@ -129,6 +129,8 @@ Search on the numeric part of the returned error code. For example, if you rece
129129
| AADSTS50178 | SessionControlNotSupportedForPassthroughUsers - Session control is not supported for passthrough users. |
130130
| AADSTS50180 | WindowsIntegratedAuthMissing - Integrated Windows authentication is needed. Enable the tenant for Seamless SSO. |
131131
| AADSTS50187 | DeviceInformationNotProvided - The service failed to perform device authentication. |
132+
| AADSTS50196 | LoopDetected - A client loop has been detected. Check the app’s logic to ensure that token caching is implemented, and that error conditions are handled correctly. The app has made too many of the same request in too short a period, indicating that it is in a faulty state or is abusively requesting tokens. |
133+
| AADSTS50199 | CmsiInterrupt - user interaction is required for this authentication. Because this is an "interaction_required" error, the client should do interactive auth. This occurs because a system webview has been used to request a token for a native application - the user must be prompted to ask if this was actually the app they meant to sign into.|
132134
| AADSTS51000 | RequiredFeatureNotEnabled - The feature is disabled. |
133135
| AADSTS51001 | DomainHintMustbePresent - Domain hint must be present with on-premises security identifier or on-premises UPN. |
134136
| AADSTS51004 | UserAccountNotInDirectory - The user account doesn’t exist in the directory. |

articles/active-directory/develop/v2-oauth2-client-creds-grant-flow.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.devlang: na
1616
ms.topic: conceptual
17-
ms.date: 11/19/2019
17+
ms.date: 12/17/2019
1818
ms.author: ryanwi
1919
ms.reviewer: hirsin
2020
ms.custom: aaddev, identityplatformtop40
@@ -61,7 +61,7 @@ This type of authorization is common for daemons and service accounts that need
6161

6262
### Application permissions
6363

64-
Instead of using ACLs, you can use APIs to expose a set of application permissions. An application permission is granted to an application by an organization's administrator, and can be used only to access data owned by that organization and its employees. For example, Microsoft Graph exposes several application permissions to do the following:
64+
Instead of using ACLs, you can use APIs to expose a set of **application permissions**. An application permission is granted to an application by an organization's administrator, and can be used only to access data owned by that organization and its employees. For example, Microsoft Graph exposes several application permissions to do the following:
6565

6666
* Read mail in all mailboxes
6767
* Read and write mail in all mailboxes
@@ -72,6 +72,11 @@ For more information about application permissions, go to [Microsoft Graph](http
7272

7373
To use application permissions in your app, follow the steps discussed in the next sections.
7474

75+
76+
> [!NOTE]
77+
> When authenticating as an application, as opposed to with a user, you cannot use "delegated permissions" (scopes that are granted by a user). You must use "application permissions", also known as "roles", that are granted by an admin for the application (or via pre-authorization by the web API).
78+
79+
7580
#### Request the permissions in the app registration portal
7681

7782
1. Register and create an app through the new [App registrations (Preview) experience](quickstart-register-app.md).

articles/active-directory/fundamentals/concept-fundamentals-security-defaults.md

Lines changed: 7 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,9 @@ Today, the majority of compromising sign-in attempts come from legacy authentica
7070

7171
After security defaults are enabled in your tenant, all authentication requests made by an older protocol will be blocked. Security defaults don't block Exchange ActiveSync.
7272

73+
> [!WARNING]
74+
> Before you enable security defaults, make sure your administrators aren't using older authentication protocols. For more information, see [How to move away from legacy authentication](concept-fundamentals-block-legacy-authentication.md).
75+
7376
### Protecting privileged actions
7477

7578
Organizations use a variety of Azure services managed through the Azure Resource Manager API, including:
@@ -86,6 +89,9 @@ After you enable security defaults in your tenant, any user who's accessing the
8689

8790
If the user isn't registered for Multi-Factor Authentication, the user will be required to register by using the Microsoft Authenticator app in order to proceed. No 14-day Multi-Factor Authentication registration period will be provided.
8891

92+
> [!NOTE]
93+
> The Azure AD Connect synchronization account is excluded from security defaults and will not be prompted to register for or perform multi-factor authentication. Organizations should not be using this account for other purposes.
94+
8995
## Deployment considerations
9096

9197
The following additional considerations are related to deployment of security defaults for your tenant.
@@ -104,18 +110,9 @@ Security defaults allow registration and use of Azure Multi-Factor Authenticatio
104110

105111
** App passwords are only available in per-user MFA with legacy authentication scenarios only if enabled by administrators.
106112

107-
### Older protocols
108-
109-
Mail clients use older authentication protocols (like IMAP, SMTP, and POP3) to make authentication requests. These protocols don't support Multi-Factor Authentication. Most of the account compromises that Microsoft sees are from attacks against older protocols that are trying to bypass Multi-Factor Authentication.
110-
111-
To ensure that Multi-Factor Authentication is required for signing in to an administrative account and attackers can't bypass it, security defaults block all authentication requests made to administrator accounts from older protocols.
112-
113-
> [!WARNING]
114-
> Before you enable this setting, make sure your administrators aren't using older authentication protocols. For more information, see [How to move away from legacy authentication](concept-fundamentals-block-legacy-authentication.md).
115-
116113
### Conditional Access
117114

118-
You can use Conditional Access to configure policies similar to security defaults, but with more granularity. If you're using Conditional Access and have Conditional Access policies enabled in your environment, security defaults won't be available to you. If you have a license that provides Conditional Access but don't have any Conditional Access policies enabled in your environment, you are welcome to use security defaults until you enable Conditional Access policies. More information about Azure AD licensing can be found on the [Azure AD pricing page](https://azure.microsoft.com/pricing/details/active-directory/).
115+
You can use Conditional Access to configure policies similar to security defaults, but with more granularity including user exclusions, which are not available in security defaults. If you're using Conditional Access and have Conditional Access policies enabled in your environment, security defaults won't be available to you. If you have a license that provides Conditional Access but don't have any Conditional Access policies enabled in your environment, you are welcome to use security defaults until you enable Conditional Access policies. More information about Azure AD licensing can be found on the [Azure AD pricing page](https://azure.microsoft.com/pricing/details/active-directory/).
119116

120117
![Warning message that you can have security defaults or Conditional Access not both](./media/concept-fundamentals-security-defaults/security-defaults-conditional-access.png)
121118

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Not all releases of Azure AD Connect will be made available for auto upgrade. Th
3838
>
3939
> You need to make sure you are running a recent version of Azure AD Connect to receive an optimal support experience.
4040
>
41-
>If you run a deprecated version of Azure AD Connect you may not have the latest security fixes, performance improvements, toubleshooting and diagnostic tools and service enhancements, and if you require support we may not be able to provide you with the level of service your organization needs.
41+
>If you run a deprecated version of Azure AD Connect you may not have the latest security fixes, performance improvements, troubleshooting and diagnostic tools and service enhancements, and if you require support we may not be able to provide you with the level of service your organization needs.
4242
>
4343
>If you have enabled Azure AD Connect for sync you will soon automatically begin receiving Health notifications that warn you about upcoming deprecations when you are running one of the older versions.
4444
>

0 commit comments

Comments
 (0)