Skip to content

Commit e72a91b

Browse files
committed
Merge branch 'main' into release-preview-acss
2 parents 70ec80f + 7367fff commit e72a91b

File tree

294 files changed

+5705
-2305
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

294 files changed

+5705
-2305
lines changed

articles/active-directory-b2c/enable-authentication-python-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -416,7 +416,7 @@ if __name__ == "__main__":
416416
417417
## Step 6: Run your web app
418418
419-
In the Terminal, run the app by entering the following command, which runs the Flask development server. The development server looks for `app.py` by default. Then, open your browser and navigate to the web app URL: <http://localhost:5000>.
419+
In the Terminal, run the app by entering the following command, which runs the Flask development server. The development server looks for `app.py` by default. Then, open your browser and navigate to the web app URL: `http://localhost:5000`.
420420
421421
# [Linux](#tab/linux)
422422

articles/active-directory-b2c/page-layout.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/12/2022
12+
ms.date: 07/18/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -26,7 +26,7 @@ Page layout packages are periodically updated to include fixes and improvements
2626

2727
Azure AD B2C page layout uses the following versions of the [jQuery library](https://jquery.com/) and the [Handlebars templates](https://handlebarsjs.com/):
2828

29-
|Element |Page layout version range |jQuery version |Handlebars Runtime version |Handlebars Compliler version |
29+
|Element |Page layout version range |jQuery version |Handlebars Runtime version |Handlebars Compiler version |
3030
|---------|---------|------|--------|----------|
3131
|multifactor |>= 1.2.4 | 3.5.1 | 4.7.6 |4.7.7 |
3232
| |< 1.2.4 | 3.4.1 |4.0.12 |2.0.1 |
@@ -52,6 +52,9 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
5252

5353
## Self-asserted page (selfasserted)
5454

55+
**2.1.14**
56+
- Fixed WCAG 2.1 accessibility bug for the TOTP multifactor authentication screens.
57+
5558
**2.1.10**
5659

5760
- Correcting to the tab index
@@ -83,7 +86,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
8386
- Fixed an accessibility bug to show inline error messages only on form submission.
8487

8588
**2.1.6**
86-
- Fixed password error get cleared when typing too quickly on a different field.
89+
- Fixed *password error gets cleared when typing too quickly on a different field*.
8790

8891
**2.1.5**
8992
- Fixed cursor jumps issue on iOS when editing in the middle of the text.
@@ -100,7 +103,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
100103

101104
**2.1.1**
102105

103-
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This is hidden by default.
106+
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This message is hidden by default.
104107
- Added support for saving passwords to iCloud Keychain.
105108
- Added support for using policy or the QueryString parameter `pageFlavor` to select the layout (classic, oceanBlue, or slateGray).
106109
- Added disclaimers on self-asserted page.
@@ -143,7 +146,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
143146

144147
- Initial release
145148

146-
## Unified sign-in sign-up page with password reset link (unifiedssp)
149+
## Unified sign-in and sign-up page with password reset link (unifiedssp)
147150

148151
> [!TIP]
149152
> If you localize your page to support multiple locales, or languages in a user flow. The [localization IDs](localization-string-ids.md) article provides the list of localization IDs that you can use for the page version you select.
@@ -159,7 +162,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
159162
- Updates to the UI elements and CSS classes
160163

161164
**2.1.5**
162-
- Fixed an issue on tab order when idp selector template is used on sign in page.
165+
- Fixed an issue on tab order when idp selector template is used on sign-in page.
163166
- Fixed an encoding issue on sign-in link text.
164167

165168
**2.1.4**
@@ -175,7 +178,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
175178
- Allowing the "forgot password" link to use as claims exchange. For more information, see [Self-service password reset](add-password-reset-policy.md#self-service-password-reset-recommended).
176179

177180
**2.1.1**
178-
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This is hidden by default.
181+
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This message is hidden by default.
179182
- Added support for using policy or the QueryString parameter `pageFlavor` to select the layout (classic, oceanBlue, or slateGray).
180183
- Added support for saving passwords to iCloud Keychain.
181184
- Focus is now placed on the first error field when multiple fields have errors.
@@ -187,7 +190,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
187190

188191
- Added support for multiple sign-up links.
189192
- Added support for user input validation according to the predicate rules defined in the policy.
190-
- When the [sign-in option](sign-in-options.md) is set to Email, the sign-in header presents "Sign in with your sign in name". The username field presents "Sign in name". For more information, see [localization](localization-string-ids.md#sign-up-or-sign-in-page-elements).
193+
- When the [sign-in option](sign-in-options.md) is set to Email, the sign-in header presents "Sign in with your sign-in name". The username field presents "Sign in name". For more information, see [localization](localization-string-ids.md#sign-up-or-sign-in-page-elements).
191194

192195
**1.2.0**
193196

@@ -225,7 +228,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
225228
**1.2.2**
226229
- Fixed an issue with auto-filling the verification code when using iOS.
227230
- Fixed an issue with redirecting a token to the relying party from Android Webview.
228-
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This is hidden by default.
231+
- Added a UXString `heading` in addition to `intro` to display on the page as a title. This messages is hidden by default.
229232
- Added support for using policy or the QueryString parameter `pageFlavor` to select the layout (classic, oceanBlue, or slateGray).
230233

231234
**1.2.1**
@@ -246,7 +249,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
246249

247250
- 'Confirm Code' button removed
248251
- The input field for the code now only takes input up to six (6) characters
249-
- The page will automatically attempt to verify the code entered when a 6-digit code is entered, without any button having to be clicked
252+
- The page will automatically attempt to verify the code entered when a six-digit code is entered, without any button having to be clicked
250253
- If the code is wrong, the input field is automatically cleared
251254
- After three (3) attempts with an incorrect code, B2C sends an error back to the relying party
252255
- Accessibility fixes
@@ -274,7 +277,7 @@ Azure AD B2C page layout uses the following versions of the [jQuery library](htt
274277
**1.1.0**
275278

276279
- Accessibility fix
277-
- Removed the default message when there is no contact from the policy
280+
- Removed the default message when there's no contact from the policy
278281
- Default CSS removed
279282

280283
**1.0.0**

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 1 addition & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -230,9 +230,6 @@ You can enforce Conditional Access policies, such as multifactor authentication
230230
>
231231
> Remote desktop using Windows Hello for Business authentication is available only for deployments that use a certificate trust model. It's currently not available for a key trust model.
232232
233-
> [!WARNING]
234-
> The per-user **Enabled/Enforced Azure AD Multi-Factor Authentication** setting is not supported for the Azure Windows VM Sign-In app.
235-
236233
## Log in by using Azure AD credentials to a Windows VM
237234

238235
> [!IMPORTANT]
@@ -396,31 +393,12 @@ You might see the following error message when you initiate a remote desktop con
396393

397394
![Screenshot of the message that says the sign-in method you're trying to use isn't allowed.](./media/howto-vm-sign-in-azure-ad-windows/mfa-sign-in-method-required.png)
398395

399-
If you've configured a Conditional Access policy that requires MFA before you can access the resource, you need to ensure that the Windows 10 or later PC that's initiating the remote desktop connection to your VM signs in by using a strong authentication method such as Windows Hello. If you don't use a strong authentication method for your remote desktop connection, you'll see the error.
396+
If you've configured a Conditional Access policy that requires MFA or legacy per-user Enabled/Enforced Azure AD MFA before you can access the resource, you need to ensure that the Windows 10 or later PC that's initiating the remote desktop connection to your VM signs in by using a strong authentication method such as Windows Hello. If you don't use a strong authentication method for your remote desktop connection, you'll see the error.
400397

401398
Another MFA-related error message is the one described previously: "Your credentials did not work."
402399

403400
![Screenshot of the message that says your credentials didn't work.](./media/howto-vm-sign-in-azure-ad-windows/your-credentials-did-not-work.png)
404401

405-
> [!WARNING]
406-
> The legacy per-user **Enabled/Enforced Azure AD Multi-Factor Authentication** setting is not supported for the Azure Windows VM Sign-In app. This setting causes sign-in to fail with the "Your credentials did not work" error message.
407-
408-
You can resolve the problem by removing the per-user MFA setting through these commands:
409-
410-
```
411-
412-
# Get StrongAuthenticationRequirements configure on a user
413-
(Get-MsolUser -UserPrincipalName [email protected]).StrongAuthenticationRequirements
414-
415-
# Clear StrongAuthenticationRequirements from a user
416-
$mfa = @()
417-
Set-MsolUser -UserPrincipalName [email protected] -StrongAuthenticationRequirements $mfa
418-
419-
# Verify StrongAuthenticationRequirements are cleared from the user
420-
(Get-MsolUser -UserPrincipalName [email protected]).StrongAuthenticationRequirements
421-
422-
```
423-
424402
If you haven't deployed Windows Hello for Business and if that isn't an option for now, you can configure a Conditional Access policy that excludes the Azure Windows VM Sign-In app from the list of cloud apps that require MFA. To learn more about Windows Hello for Business, see [Windows Hello for Business overview](/windows/security/identity-protection/hello-for-business/hello-identity-verification).
425403

426404
> [!NOTE]

articles/active-directory/fundamentals/road-to-the-cloud-migrate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -263,7 +263,7 @@ Based on the app dependencies, you have three migration options:
263263
>[!NOTE]
264264
>* Utilize Azure AD Domain Services if the dependencies are aligned with [Common deployment scenarios for Azure AD Domain Services](../../active-directory-domain-services/scenarios.md).
265265
>* To validate if Azure AD DS is a good fit, you might use tools like Service Map [Microsoft Azure Marketplace](https://azuremarketplace.microsoft.com/marketplace/apps/Microsoft.ServiceMapOMS?tab=Overview) and [Automatic Dependency Mapping with Service Map and Live Maps](https://techcommunity.microsoft.com/t5/system-center-blog/automatic-dependency-mapping-with-service-map-and-live-maps/ba-p/351867).
266-
>* Validate your SQL server instantiations can be [migrated to a different domain](https://social.technet.microsoft.com/wiki/contents/articles/24960.migrating-sql-server-to-new-domain.aspx). If your SQL service is running in virtual machines, [use this guidance](/azure-sql/migration-guides/virtual-machines/sql-server-to-sql-on-azure-vm-individual-databases-guide).
266+
>* Validate your SQL server instantiations can be [migrated to a different domain](https://social.technet.microsoft.com/wiki/contents/articles/24960.migrating-sql-server-to-new-domain.aspx). If your SQL service is running in virtual machines, [use this guidance](/azure/azure-sql/migration-guides/virtual-machines/sql-server-to-sql-on-azure-vm-individual-databases-guide).
267267
268268
#### Implement approach #2
269269

0 commit comments

Comments
 (0)