Skip to content

Commit e5d82e4

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into peering
2 parents 58e8a8e + a919525 commit e5d82e4

File tree

1,017 files changed

+11673
-5933
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,017 files changed

+11673
-5933
lines changed
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/high-performance-compute/index.yml",
5+
"redirect_url": "/articles/high-performance-computing",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

.openpublishing.redirection.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5963,11 +5963,6 @@
59635963
"redirect_url": "/azure/reliability/cross-region-replication-azure",
59645964
"redirect_document_id": true
59655965
},
5966-
{
5967-
"source_path_from_root": "/articles/partner-solutions/index.md",
5968-
"redirect_url": "/azure/partner-solutions/overview",
5969-
"redirect_document_id": false
5970-
},
59715966
{
59725967
"source_path_from_root": "/articles/fxt-edge-filer/fxt-add-nodes.md",
59735968
"redirect_url": "/azure/fxt-edge-filer/add-nodes",
@@ -6358,6 +6353,11 @@
63586353
"redirect_url": "/azure/azure-cache-for-redis/scripts/create-manage-cache",
63596354
"redirect_document_id": false
63606355
},
6356+
{
6357+
"source_path_from_root": "/articles/storage/blobs/anonymous-read-access-client.md",
6358+
"redirect_url": "/azure/storage/blobs/anonymous-read-access-prevent",
6359+
"redirect_document_id": false
6360+
},
63616361
{
63626362
"source_path_from_root": "/articles/storage/common/storage-auth-abac-attributes.md",
63636363
"redirect_url": "/azure/storage/blobs/storage-auth-abac-attributes",

.whatsnew/.application-management.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
},
1818
"areas": [
1919
{
20-
"name": [ "."],
20+
"names": [ "."],
2121
"heading": "Azure Active Directory application management"
2222
}
2323
]

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ To use MS Graph API, and interact with resources in your Azure AD B2C tenant, yo
3939
- [Update a user](/graph/api/user-update)
4040
- [Delete a user](/graph/api/user-delete)
4141

42-
## User phone number management (beta)
42+
## User phone number management
4343

4444
A phone number that can be used by a user to sign-in using [SMS or voice calls](sign-in-options.md#phone-sign-in), or [multifactor authentication](multi-factor-authentication.md). For more information, see [Azure AD authentication methods API](/graph/api/resources/phoneauthenticationmethod).
4545

@@ -54,9 +54,9 @@ Note, the [list](/graph/api/authentication-list-phonemethods) operation returns
5454
![Enable phone sign-in](./media/microsoft-graph-operations/enable-phone-sign-in.png)
5555

5656
> [!NOTE]
57-
> In the current beta version, this API works only if the phone number is stored with a space between the country code and the phone number. The Azure AD B2C service doesn't currently add this space by default.
57+
> A correctly represented phone number is stored with a space between the country code and the phone number. The Azure AD B2C service doesn't currently add this space by default.
5858
59-
## Self-service password reset email address (beta)
59+
## Self-service password reset email address
6060

6161
An email address that can be used by a [username sign-in account](sign-in-options.md#username-sign-in) to reset the password. For more information, see [Azure AD authentication methods API](/graph/api/resources/emailauthenticationmethod).
6262

@@ -66,7 +66,7 @@ An email address that can be used by a [username sign-in account](sign-in-option
6666
- [Update](/graph/api/emailauthenticationmethod-update)
6767
- [Delete](/graph/api/emailauthenticationmethod-delete)
6868

69-
## Software OATH token authentication method (beta)
69+
## Software OATH token authentication method
7070

7171
A software OATH token is a software-based number generator that uses the OATH time-based one-time password (TOTP) standard for multifactor authentication via an authenticator app. Use the Microsoft Graph API to manage a software OATH token registered to a user:
7272

@@ -78,13 +78,14 @@ An email address that can be used by a [username sign-in account](sign-in-option
7878

7979
Manage the [identity providers](add-identity-provider.md) available to your user flows in your Azure AD B2C tenant.
8080

81-
- [List identity providers registered in the Azure AD B2C tenant](/graph/api/identityprovider-list)
82-
- [Create an identity provider](/graph/api/identityprovider-post-identityproviders)
83-
- [Get an identity provider](/graph/api/identityprovider-get)
84-
- [Update identity provider](/graph/api/identityprovider-update)
85-
- [Delete an identity provider](/graph/api/identityprovider-delete)
81+
- [List identity providers available in the Azure AD B2C tenant](/graph/api/identityproviderbase-availableprovidertypes)
82+
- [List identity providers configured in the Azure AD B2C tenant](/graph/api/iidentitycontainer-list-identityproviders)
83+
- [Create an identity provider](/graph/api/identitycontainer-post-identityproviders)
84+
- [Get an identity provider](/graph/api/identityproviderbase-get)
85+
- [Update identity provider](/graph/api/identityproviderbase-update)
86+
- [Delete an identity provider](/graph/api/identityproviderbase-delete)
8687

87-
## User flow
88+
## User flow (beta)
8889

8990
Configure pre-built policies for sign-up, sign-in, combined sign-up and sign-in, password reset, and profile update.
9091

@@ -100,7 +101,7 @@ Choose a mechanism for letting users register via local accounts. Local accounts
100101
- [Get](/graph/api/b2cauthenticationmethodspolicy-get)
101102
- [Update](/graph/api/b2cauthenticationmethodspolicy-update)
102103

103-
## Custom policies
104+
## Custom policies (beta)
104105

105106
The following operations allow you to manage your Azure AD B2C Trust Framework policies, known as [custom policies](custom-policy-overview.md).
106107

@@ -110,7 +111,7 @@ The following operations allow you to manage your Azure AD B2C Trust Framework p
110111
- [Update or create trust framework policy.](/graph/api/trustframework-put-trustframeworkpolicy)
111112
- [Delete an existing trust framework policy](/graph/api/trustframeworkpolicy-delete)
112113

113-
## Policy keys
114+
## Policy keys (beta)
114115

115116
The Identity Experience Framework stores the secrets referenced in a custom policy to establish trust between components. These secrets can be symmetric or asymmetric keys/values. In the Azure portal, these entities are shown as **Policy keys**.
116117

@@ -169,15 +170,16 @@ For more information about accessing Azure AD B2C audit logs, see [Accessing Azu
169170

170171
## Conditional Access
171172

172-
- [List all of the Conditional Access policies](/graph/api/conditionalaccessroot-list-policies?tabs=http)
173+
- [List the built-in templates for Conditional Access policy scenarios](/graph/api/conditionalaccessroot-list-templates)
174+
- [List all of the Conditional Access policies](/graph/api/conditionalaccessroot-list-policies)
173175
- [Read properties and relationships of a Conditional Access policy](/graph/api/conditionalaccesspolicy-get)
174176
- [Create a new Conditional Access policy](/graph/api/resources/application)
175177
- [Update a Conditional Access policy](/graph/api/conditionalaccesspolicy-update)
176178
- [Delete a Conditional Access policy](/graph/api/conditionalaccesspolicy-delete)
177179

178180
## Retrieve or restore deleted users and applications
179181

180-
Deleted items can only be restored if they were deleted within the last 30 days.
182+
Deleted users and apps can only be restored if they were deleted within the last 30 days.
181183

182184
- [List deleted items](/graph/api/directory-deleteditems-list)
183185
- [Get a deleted item](/graph/api/directory-deleteditems-get)

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,9 @@ Applications and systems that support customization of the attribute list includ
120120
> [!NOTE]
121121
> Editing the list of supported attributes is only recommended for administrators who have customized the schema of their applications and systems, and have first-hand knowledge of how their custom attributes have been defined or if a source attribute is not automatically displayed in the Azure Portal UI. This sometimes requires familiarity with the APIs and developer tools provided by an application or system. The ability to edit the list of supported attributes is locked down by default, but customers can enable the capability by navigating to the following URL: https://portal.azure.com/?Microsoft_AAD_Connect_Provisioning_forceSchemaEditorEnabled=true . You can then navigate to your application to view the attribute list as described [above](#editing-the-list-of-supported-attributes).
122122
123+
> [!NOTE]
124+
> When a directory extension attribute in Azure AD does not show up automatically in your attribute mapping drop-down, you can manually add it to the "Azure AD attribute list". When manually adding Azure AD directory extension attributes to your provisioning app, note that directory extension attribute names are case-sensitive. For example: If you have a directory extension attribute named `extension_53c9e2c0exxxxxxxxxxxxxxxx _acneCostCenter`, make sure you enter it in the same format as defined in the directory.
125+
123126
When editing the list of supported attributes, the following properties are provided:
124127

125128
- **Name** - The system name of the attribute, as defined in the target object's schema.

articles/active-directory/app-provisioning/on-premises-migrate-microsoft-identity-manager.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,13 +43,13 @@ At this point, the MIM Sync server is no longer needed.
4343

4444
## Import a connector configuration
4545

46-
1. Install the ECMA Connector host and provisioning agent on a Windows Server, using the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#download-install-and-configure-the-azure-ad-connect-provisioning-agent-package) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#download-install-and-configure-the-azure-ad-connect-provisioning-agent-package) articles.
46+
1. Install the ECMA Connector host and provisioning agent on a Windows Server, using the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#3-install-and-configure-the-azure-ad-connect-provisioning-agent) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#download-install-and-configure-the-azure-ad-connect-provisioning-agent-package) articles.
4747
1. Sign in to the Windows server as the account that the Azure AD ECMA Connector Host runs as.
4848
1. Change to the directory C:\Program Files\Microsoft ECMA2host\Service\ECMA. Ensure there are one or more DLLs already present in that directory. Those DLLs correspond to Microsoft-delivered connectors.
4949
1. Copy the MA DLL for your connector, and any of its prerequisite DLLs, to that same ECMA subdirectory of the Service directory.
5050
1. Change to the directory C:\Program Files\Microsoft ECMA2Host\Wizard. Run the program Microsoft.ECMA2Host.ConfigWizard.exe to set up the ECMA Connector Host configuration.
5151
1. A new window appears with a list of connectors. By default, no connectors will be present. Select **New connector**.
52-
1. Specify the management agent XML file that was exported from MIM Sync earlier. Continue with the configuration and schema-mapping instructions from the section "Create a connector" in either the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#create-a-generic-sql-connector) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#configure-a-generic-ldap-connector) articles.
52+
1. Specify the management agent XML file that was exported from MIM Sync earlier. Continue with the configuration and schema-mapping instructions from the section "Create a connector" in either the [provisioning users into SQL based applications](on-premises-sql-connector-configure.md#6-create-a-generic-sql-connector) or [provisioning users into LDAP directories](on-premises-ldap-connector-configure.md#configure-a-generic-ldap-connector) articles.
5353

5454
## Next steps
5555

articles/active-directory/app-proxy/application-proxy-configure-native-client-application.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,6 @@ After you edit the MSAL code with these parameters, your users can authenticate
112112

113113
## Next steps
114114

115-
For more information about the native application flow, see [Native apps in Azure Active Directory](../azuread-dev/native-app.md).
115+
For more information about the native application flow, see [mobile](../develop/authentication-flows-app-scenarios.md#mobile-app-that-calls-a-web-api-on-behalf-of-an-interactive-user) and [desktop](../develop/authentication-flows-app-scenarios.md#desktop-app-that-calls-a-web-api-on-behalf-of-a-signed-in-user) apps in Azure Active Directory.
116116

117117
Learn about setting up [Single sign-on to applications in Azure Active Directory](../manage-apps/sso-options.md#choosing-a-single-sign-on-method).

articles/active-directory/authentication/concept-certificate-based-authentication-smartcard.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/05/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: justinha
1212
author: vimrang
@@ -77,7 +77,7 @@ The Windows smart card sign-in works with the latest preview build of Windows 11
7777
7878
## Restrictions and caveats
7979

80-
- Azure AD CBA is supported on Windows Hybrid or Azure AD Joined.
80+
- Azure AD CBA is supported on Windows devices that are hybrid or Azure AD joined.
8181
- Users must be in a managed domain or using Staged Rollout and can't use a federated authentication model.
8282

8383
## Next steps

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Now we'll walk through each step:
6868
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/cert-picker.png" alt-text="Screenshot of the certificate picker." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/cert-picker.png":::
6969

7070
1. Azure AD verifies the certificate revocation list to make sure the certificate isn't revoked and is valid. Azure AD identifies the user by using the [username binding configured](how-to-certificate-based-authentication.md#step-4-configure-username-binding-policy) on the tenant to map the certificate field value to the user attribute value.
71-
1. If a unique user is found with a Conditional Access policy that requires multifactor authentication (MFA), and the [certificate authentication binding rule](how-to-certificate-based-authentication.md#step-3-configure-authentication-binding-policy) satisfies MFA, then Azure AD signs the user in immediately. If the certificate satisfies only a single factor, then it requests the user for a second factor to complete Azure AD Multi-Factor Authentication.
71+
1. If a unique user is found with a Conditional Access policy that requires multifactor authentication (MFA), and the [certificate authentication binding rule](how-to-certificate-based-authentication.md#step-3-configure-authentication-binding-policy) satisfies MFA, then Azure AD signs the user in immediately. If multifactor authentication is required but the certificate satisfies only a single factor, authentication will fail.
7272
1. Azure AD completes the sign-in process by sending a primary refresh token back to indicate successful sign-in.
7373
1. If the user sign-in is successful, the user can access the application.
7474

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/23/2022
9+
ms.date: 11/10/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -61,7 +61,7 @@ Combined registration supports the authentication methods and actions in the fol
6161
| Email | Yes | Yes | Yes |
6262
| Security questions | Yes | No | Yes |
6363
| App passwords* | Yes | No | Yes |
64-
| FIDO2 security keys*| Yes | Yes | Yes |
64+
| FIDO2 security keys*| Yes | No | Yes |
6565

6666
> [!NOTE]
6767
> <b>Office phone</b> can only be registered in *Interrupt mode* if the users *Business phone* property has been set. Office phone can be added by users in *Managed mode from the [Security info](https://mysignins.microsoft.com/security-info)* without this requirement. <br />
@@ -93,7 +93,7 @@ For both modes, users who have previously registered a method that can be used f
9393

9494
### Interrupt mode
9595

96-
Combined registration adheres to both multifactor authentication and SSPR policies, if both are enabled for your tenant. These policies control whether a user is interrupted for registration during sign-in and which methods are available for registration. If only an SSPR policy is enabled, then users will be able to skip the registration interruption and complete it at a later time.
96+
Combined registration adheres to both multifactor authentication and SSPR policies, if both are enabled for your tenant. These policies control whether a user is interrupted for registration during sign-in and which methods are available for registration. If only an SSPR policy is enabled, then users will be able to skip (indefinitely) the registration interruption and complete it at a later time.
9797

9898
The following are sample scenarios where users might be prompted to register or refresh their security info:
9999

0 commit comments

Comments
 (0)