Skip to content

Commit e919b03

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into upgrade-packet-core
2 parents cf181ed + a9d31c2 commit e919b03

File tree

620 files changed

+7122
-3354
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

620 files changed

+7122
-3354
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6313,6 +6313,11 @@
63136313
"redirect_url": "/azure/azure-app-configuration/quickstart-azure-functions-csharp",
63146314
"redirect_document_id": false
63156315
},
6316+
{
6317+
"source_path_from_root": "/articles/azure-arc/data/reference/reference-az-sql-mi-arc-dag.md",
6318+
"redirect_url": "/azure/azure-arc/data/reference/reference-az-sql-instance-failover-group-arc",
6319+
"redirect_document_id":true
6320+
},
63166321
{
63176322
"source_path_from_root": "/articles/azure-arc/data/retrieve-the-username-password-for-data-controller.md",
63186323
"redirect_url": "/azure/azure-arc/data/update-service-principal-credentials",

CONTRIBUTING.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Please use the Feedback tool at the bottom of any article to submit bugs and sug
2222

2323
### Editing in GitHub
2424

25-
Follow the guidance for [Quick edits to existing documents](https://docs.microsoft.com/contribute/#quick-edits-to-existing-documents) in our contributor guide.
25+
Follow the guidance for [Quick edits to existing documents](https://docs.microsoft.com/contribute/#quick-edits-to-documentation) in our contributor guide.
2626

2727
### Pull requests
2828

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -671,7 +671,7 @@
671671
- name: Resources
672672
items:
673673
- name: Azure Roadmap
674-
href: https://azure.microsoft.com/roadmap/?category=security-identity
674+
href: https://azure.microsoft.com/updates/?status=nowavailable,inpreview,indevelopment&category=identity,security&query=b2c
675675
- name: Frequently asked questions
676676
href: ./faq.yml
677677
displayName: FAQ

articles/active-directory-b2c/configure-authentication-sample-angular-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ export const b2cPolicies = {
145145
export const msalConfig: Configuration = {
146146
auth: {
147147
clientId: '<your-MyApp-application-ID>',
148-
authority: b2cPolicies.authorities.signUpSignIn,
148+
authority: b2cPolicies.authorities.signUpSignIn.authority,
149149
knownAuthorities: [b2cPolicies.authorityDomain],
150150
redirectUri: '/',
151151
},

articles/active-directory-b2c/string-transformations.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1178,6 +1178,9 @@ Returns a string array that contains the substrings in this instance that are de
11781178
| InputParameter | delimiter | string | The string to use as a separator, such as comma `,`. |
11791179
| OutputClaim | outputClaim | stringCollection | A string collection whose elements contain the substrings in this string that are delimited by the `delimiter` input parameter. |
11801180

1181+
> [!NOTE]
1182+
> Any existing elements in the `OutputClaim` stringCollection will be removed.
1183+
11811184
### Example of StringSplit
11821185

11831186
The following example takes a comma delimiter string of user roles, and converts it to a string collection.

articles/active-directory/authentication/active-directory-certificate-based-authentication-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/10/2022
9+
ms.date: 05/04/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -121,7 +121,7 @@ The EAS profile must contain the following information:
121121

122122
- The EAS endpoint (for example, outlook.office365.com)
123123

124-
An EAS profile can be configured and placed on the device through the utilization of Mobile device management (MDM) such as Intune or by manually placing the certificate in the EAS profile on the device.
124+
An EAS profile can be configured and placed on the device through the utilization of Mobile device management (MDM) such as Microsoft Endpoint Manager or by manually placing the certificate in the EAS profile on the device.
125125

126126
### Testing EAS client applications on Android
127127

articles/active-directory/authentication/active-directory-certificate-based-authentication-ios.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/16/2022
9+
ms.date: 05/04/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -29,7 +29,7 @@ Using certificates eliminates the need to enter a username and password combinat
2929
| Apps | Support |
3030
| --- | --- |
3131
| Azure Information Protection app |![Check mark signifying support for this application][1] |
32-
| Intune Company Portal |![Check mark signifying support for this application][1] |
32+
| Company Portal |![Check mark signifying support for this application][1] |
3333
| Microsoft Teams |![Check mark signifying support for this application][1] |
3434
| Office (mobile) |![Check mark signifying support for this application][1] |
3535
| OneNote |![Check mark signifying support for this application][1] |

articles/active-directory/authentication/concept-password-ban-bad-combined-policy.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Combined password policy and weak password check in Azure Active Directory
3-
description: Learn about the combined password policy and weak password check in Azure Active Directory
2+
title: Combined password policy and check for weak passwords in Azure Active Directory
3+
description: Learn about the combined password policy and check for weak passwords in Azure Active Directory
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/14/2021
9+
ms.date: 05/04/2022
1010

1111
ms.author: justinha
1212
author: sajiang
@@ -15,7 +15,7 @@ ms.reviewer: sajiang
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Combined password policy and weak password check in Azure Active Directory
18+
# Combined password policy and check for weak passwords in Azure Active Directory
1919

2020
Beginning in October 2021, Azure Active Directory (Azure AD) validation for compliance with password policies also includes a check for [known weak passwords](concept-password-ban-bad.md) and their variants.
2121
As the combined check for password policy and banned passwords gets rolled out to tenants, Azure AD and Office 365 admin center users may see differences when they create, change, or reset their passwords. This topic explains details about the password policy criteria checked by Azure AD.
@@ -24,29 +24,29 @@ As the combined check for password policy and banned passwords gets rolled out t
2424

2525
A password policy is applied to all user and admin accounts that are created and managed directly in Azure AD. You can [ban weak passwords](concept-password-ban-bad.md) and define parameters to [lock out an account](howto-password-smart-lockout.md) after repeated bad password attempts. Other password policy settings can't be modified.
2626

27-
The Azure AD password policy doesn't apply to user accounts synchronized from an on-premises AD DS environment using Azure AD Connect, unless you enable EnforceCloudPasswordPolicyForPasswordSyncedUsers.
27+
The Azure AD password policy doesn't apply to user accounts synchronized from an on-premises AD DS environment using Azure AD Connect unless you enable EnforceCloudPasswordPolicyForPasswordSyncedUsers.
2828

29-
The following Azure AD password policy requirements apply for all passwords that are created, changed, or reset in Azure AD. Requirements are applied during user provisioning, password change, and password reset flows. Unless noted, you can't change these settings.
29+
The following Azure AD password policy requirements apply for all passwords that are created, changed, or reset in Azure AD. Requirements are applied during user provisioning, password change, and password reset flows. You can't change these settings except as noted.
3030

3131
| Property | Requirements |
3232
| --- | --- |
3333
| Characters allowed |Uppercase characters (A - Z)<br>Lowercase characters (a - z)<br>Numbers (0 - 9)<br>Symbols:<br>- @ # $ % ^ & * - _ ! + = [ ] { } &#124; \ : ' , . ? / \` ~ " ( ) ; < ><br>- blank space |
3434
| Characters not allowed | Unicode characters |
35-
| Password length |Passwords require<br>- A minimum of 8 characters<br>- A maximum of 256 characters</li> |
36-
| Password complexity |Passwords require three out of four of the following:<br>- Uppercase characters<br>- Lowercase characters<br>- Numbers <br>- Symbols<br> Note: Password complexity check is not required for Education tenants. |
37-
| Password not recently used | When a user changes or resets their password, the new password cannot be the same as the current or recently used passwords. |
38-
| Password is not banned by [Azure AD Password Protection](concept-password-ban-bad.md) | The password can't be on the global list of banned passwords for Azure AD Password Protection, or on the customizable list of banned passwords specific to your organization. |
35+
| Password length |Passwords require<br>- A minimum of eight characters<br>- A maximum of 256 characters</li> |
36+
| Password complexity |Passwords require three out of four of the following categories:<br>- Uppercase characters<br>- Lowercase characters<br>- Numbers <br>- Symbols<br> Note: Password complexity check isn't required for Education tenants. |
37+
| Password not recently used | When a user changes or resets their password, the new password can't be the same as the current or recently used passwords. |
38+
| Password isn't banned by [Azure AD Password Protection](concept-password-ban-bad.md) | The password can't be on the global list of banned passwords for Azure AD Password Protection, or on the customizable list of banned passwords specific to your organization. |
3939

4040
## Password expiration policies
4141

42-
Password expiration policies are unchanged but they are included in this topic for completeness. A *global administrator* or *user administrator* can use the [Microsoft Azure AD Module for Windows PowerShell](/powershell/module/Azuread/) to set user passwords not to expire.
42+
Password expiration policies are unchanged but they're included in this topic for completeness. A *global administrator* or *user administrator* can use the [Microsoft Azure AD Module for Windows PowerShell](/powershell/module/Azuread/) to set user passwords not to expire.
4343

4444
> [!NOTE]
4545
> By default, only passwords for user accounts that aren't synchronized through Azure AD Connect can be configured to not expire. For more information about directory synchronization, see [Connect AD with Azure AD](../hybrid/how-to-connect-password-hash-synchronization.md#password-expiration-policy).
4646
4747
You can also use PowerShell to remove the never-expires configuration, or to see user passwords that are set to never expire.
4848

49-
The following expiration requirements apply to other providers that use Azure AD for identity and directory services, such as Intune and Microsoft 365.
49+
The following expiration requirements apply to other providers that use Azure AD for identity and directory services, such as Microsoft Endpoint Manager and Microsoft 365.
5050

5151
| Property | Requirements |
5252
| --- | --- |

articles/active-directory/authentication/concept-resilient-controls.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: authentication
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 07/13/2021
12+
ms.date: 05/04/2022
1313
ms.author: martinco
1414
ms.collection: M365-identity-device-management
1515
---
@@ -22,10 +22,10 @@ Organizations that rely on a single access control, such as multi-factor authent
2222

2323
This document provides guidance on strategies an organization should adopt to provide resilience to reduce the risk of lockout during unforeseen disruptions with the following scenarios:
2424

25-
1. Organizations can increase their resiliency to reduce the risk of lockout **before a disruption** by implementing mitigation strategies or contingency plans.
26-
2. Organizations can continue to access apps and resources they choose **during a disruption** by having mitigation strategies and contingency plans in place.
27-
3. Organizations should make sure they preserve information, such as logs, **after a disruption** and before they roll back any contingencies they implemented.
28-
4. Organizations that haven’t implemented prevention strategies or alternative plans may be able to implement **emergency options** to deal with the disruption.
25+
- Organizations can increase their resiliency to reduce the risk of lockout **before a disruption** by implementing mitigation strategies or contingency plans.
26+
- Organizations can continue to access apps and resources they choose **during a disruption** by having mitigation strategies and contingency plans in place.
27+
- Organizations should make sure they preserve information, such as logs, **after a disruption** and before they roll back any contingencies they implemented.
28+
- Organizations that haven’t implemented prevention strategies or alternative plans may be able to implement **emergency options** to deal with the disruption.
2929

3030
## Key guidance
3131

@@ -59,11 +59,11 @@ To unlock admin access to your tenant, you should create emergency access accoun
5959

6060
Incorporate the following access controls in your existing Conditional Access policies for organization:
6161

62-
1. Provision multiple authentication methods for each user that rely on different communication channels, for example the Microsoft Authenticator app (internet-based), OATH token (generated on-device), and SMS (telephonic). The following PowerShell script will help you identify in advance, which additional methods your users should register: [Script for Azure AD MFA authentication method analysis](/samples/azure-samples/azure-mfa-authentication-method-analysis/azure-mfa-authentication-method-analysis/).
63-
2. Deploy Windows Hello for Business on Windows 10 devices to satisfy MFA requirements directly from device sign-in.
64-
3. Use trusted devices via [Azure AD Hybrid Join](../devices/overview.md) or [Microsoft Intune Managed devices](/intune/planning-guide). Trusted devices will improve user experience because the trusted device itself can satisfy the strong authentication requirements of policy without an MFA challenge to the user. MFA will then be required when enrolling a new device and when accessing apps or resources from untrusted devices.
65-
4. Use Azure AD identity protection risk-based policies that prevent access when the user or sign-in is at risk in place of fixed MFA policies.
66-
5. If you are protecting VPN access using Azure AD MFA NPS extension, consider federating your VPN solution as a [SAML app](../manage-apps/view-applications-portal.md) and determine the app category as recommended below.
62+
- Provision multiple authentication methods for each user that rely on different communication channels, for example the Microsoft Authenticator app (internet-based), OATH token (generated on-device), and SMS (telephonic). The following PowerShell script will help you identify in advance, which additional methods your users should register: [Script for Azure AD MFA authentication method analysis](/samples/azure-samples/azure-mfa-authentication-method-analysis/azure-mfa-authentication-method-analysis/).
63+
- Deploy Windows Hello for Business on Windows 10 devices to satisfy MFA requirements directly from device sign-in.
64+
- Use trusted devices via [Azure AD Hybrid Join](../devices/overview.md) or [Microsoft Endpoint Manager](/intune/planning-guide). Trusted devices will improve user experience because the trusted device itself can satisfy the strong authentication requirements of policy without an MFA challenge to the user. MFA will then be required when enrolling a new device and when accessing apps or resources from untrusted devices.
65+
- Use Azure AD identity protection risk-based policies that prevent access when the user or sign-in is at risk in place of fixed MFA policies.
66+
- If you are protecting VPN access using Azure AD MFA NPS extension, consider federating your VPN solution as a [SAML app](../manage-apps/view-applications-portal.md) and determine the app category as recommended below.
6767

6868
>[!NOTE]
6969
> Risk-based policies require [Azure AD Premium P2](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing) licenses.

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/25/2021
9+
ms.date: 05/04/2022
1010

1111
ms.author: justinha
1212
author: justinha

0 commit comments

Comments
 (0)