Skip to content

Commit ea3e6be

Browse files
committed
Syncing with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-macos-sep23
2 parents 8693c64 + d32dfd0 commit ea3e6be

File tree

594 files changed

+7396
-6564
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

594 files changed

+7396
-6564
lines changed

.openpublishing.publish.config.json

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1189,11 +1189,14 @@
11891189
"articles/data-catalog/.openpublishing.redirection.data-catalog.json",
11901190
"articles/data-factory/.openpublishing.redirection.data-factory.json",
11911191
"articles/data-lake-analytics/.openpublishing.redirection.data-lake-analytics.json",
1192+
"articles/deployment-environments/.openpublishing.redirection.deployment-environments.json",
1193+
"articles/dev-box/.openpublishing.redirection.dev-box.json",
11921194
"articles/digital-twins/.openpublishing.redirection.digital-twins.json",
11931195
"articles/event-grid/.openpublishing.redirection.event-grid.json",
11941196
"articles/event-hubs/.openpublishing.redirection.event-hubs.json",
11951197
"articles/hdinsight/.openpublishing.redirection.hdinsight.json",
11961198
"articles/healthcare-apis/.openpublishing.redirection.healthcare-apis.json",
1199+
"articles/internet-peering/.openpublishing.redirection.internet-peering.json",
11971200
"articles/iot-accelerators/.openpublishing.redirection.iot-accelerators.json",
11981201
"articles/iot-central/.openpublishing.redirection.iot-central.json",
11991202
"articles/iot-develop/.openpublishing.redirection.iot-develop.json",
@@ -1208,9 +1211,12 @@
12081211
"articles/mariadb/.openpublishing.redirection.mariadb.json",
12091212
"articles/marketplace/.openpublishing.redirection.marketplace.json",
12101213
"articles/mysql/.openpublishing.redirection.mysql.json",
1214+
"articles/network-watcher/.openpublishing.redirection.network-watcher.json",
12111215
"articles/object-anchors/.openpublishing.redirection.object-anchors.json",
1216+
"articles/peering-service/.openpublishing.redirection.peering-service.json",
12121217
"articles/postgresql/.openpublishing.redirection.postgresql.json",
12131218
"articles/purview/.openpublishing.redirection.purview.json",
1219+
"articles/route-server/.openpublishing.redirection.route-server.json",
12141220
"articles/sap/.openpublishing.redirection.sap.json",
12151221
"articles/service-bus-messaging/.openpublishing.redirection.service-bus-messaging.json",
12161222
"articles/spatial-anchors/.openpublishing.redirection.spatial-anchors.json",
@@ -1220,9 +1226,6 @@
12201226
"articles/stream-analytics/.openpublishing.redirection.stream-analytics.json",
12211227
"articles/synapse-analytics/.openpublishing.redirection.synapse-analytics.json",
12221228
"articles/virtual-machine-scale-sets/.openpublishing.redirection.virtual-machine-scale-sets.json",
1223-
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json",
1224-
"articles/dev-box/.openpublishing.redirection.dev-box.json",
1225-
"articles/deployment-environments/.openpublishing.redirection.deployment-environments.json",
1226-
"articles/network-watcher/.openpublishing.redirection.network-watcher.json"
1229+
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json"
12271230
]
12281231
}

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5460,6 +5460,11 @@
54605460
"redirect_url": "/azure/active-directory/fundamentals/concept-fundamentals-security-defaults",
54615461
"redirect_document_id": true
54625462
},
5463+
{
5464+
"source_path_from_root": "/articles/active-directory/reports-monitoring/reference-azure-ad-sla-performance.md",
5465+
"redirect_url": "/azure/active-directory/reports-monitoring/reference-sla-performance",
5466+
"redirect_document_id": true
5467+
},
54635468
{
54645469
"source_path_from_root": "/articles/active-directory/reports-monitoring/quickstart-filter-audit-log.md",
54655470
"redirect_url": "/azure/active-directory/reports-monitoring/howto-customize-filter-logs",

.openpublishing.redirection.json

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -20,16 +20,6 @@
2020
"redirect_URL": "tutorial-assess-webapps",
2121
"redirect_document_id": false
2222
},
23-
{
24-
"source_path": "articles/route-server/tutorial-protect-route-server.md",
25-
"redirect_URL": "/azure/route-server/tutorial-protect-route-server-ddos",
26-
"redirect_document_id": false
27-
},
28-
{
29-
"source_path": "articles/route-server/routing-preference.md",
30-
"redirect_url": "/azure/route-server/overview",
31-
"redirect_document_id": false
32-
},
3323
{
3424
"source_path": "articles/cloud-services-extended-support/deploy-visual-studio.md",
3525
"redirect_url": "/visualstudio/azure/cloud-services-extended-support?context=%2Fazure%2Fcloud-services-extended-support%2Fcontext%2Fcontext",
@@ -24553,22 +24543,22 @@
2455324543
},
2455424544
{
2455524545
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-01-register-app.md",
24556-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-register-app.md",
24546+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-register-app",
2455724547
"redirect_document_id": false
2455824548
},
2455924549
{
2456024550
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-02-prepare-spa.md",
24561-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-prepare-spa.md",
24551+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-prepare-spa",
2456224552
"redirect_document_id": false
2456324553
},
2456424554
{
2456524555
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-03-sign-in-users.md",
24566-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-sign-in-users.md",
24556+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-sign-in-users",
2456724557
"redirect_document_id": false
2456824558
},
2456924559
{
2457024560
"source_path_from_root": "/articles/active-directory/develop/single-page-app-tutorial-04-call-api.md",
24571-
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-call-api.md",
24561+
"redirect_url": "/azure/active-directory/develop/tutorial-single-page-app-react-call-api",
2457224562
"redirect_document_id": false
2457324563
}
2457424564
]

articles/active-directory/app-provisioning/skip-out-of-scope-deletions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -59,10 +59,10 @@ Copy the Response into a text file. It looks like the JSON text shown, with valu
5959
Here's the JSON block to add to the mapping.
6060

6161
```json
62-
{
63-
"key": "SkipOutOfScopeDeletions",
64-
"value": "True"
65-
}
62+
{
63+
"key": "SkipOutOfScopeDeletions",
64+
"value": "True"
65+
}
6666
```
6767

6868
## Step 4: Update the secrets endpoint with the SkipOutOfScopeDeletions flag

articles/active-directory/authentication/concept-authentication-strengths.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/14/2023
9+
ms.date: 09/27/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -232,7 +232,7 @@ An authentication strength Conditional Access policy works together with [MFA tr
232232

233233
- **Authentication methods that aren't currently supported by authentication strength** - The **Email one-time pass (Guest)** authentication method isn't included in the available combinations.
234234

235-
- **Windows Hello for Business** – If the user signed in with Windows Hello for Business as their primary authentication method, it can be used to satisfy an authentication strength requirement that includes Windows Hello for Business. But if the user signed in with another method like password as their primary authenticating method, and the authentication strength requires Windows Hello for Business, they get prompted to sign in with Windows Hello for Business.
235+
- **Windows Hello for Business** – If the user signed in with Windows Hello for Business as their primary authentication method, it can be used to satisfy an authentication strength requirement that includes Windows Hello for Business. However, if the user signed in with another method like password as their primary authenticating method, and the authentication strength requires Windows Hello for Business, they aren't prompted to sign in with Windows Hello for Business. The user needs to restart the session, choose **Sign-in options**, and select a method required by the authentication strength.
236236

237237

238238
## Known isssues

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 09/25/2023
9+
ms.date: 09/27/2023
1010

1111

1212
ms.author: justinha
@@ -49,15 +49,21 @@ Now we'll walk through each step:
4949

5050
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-alt.png" alt-text="Screenshot of the Sign-in if FIDO2 is also enabled.":::
5151

52-
1. Once the user selects certificate-based authentication, the client is redirected to the certauth endpoint, which is [https://certauth.login.microsoftonline.com](https://certauth.login.microsoftonline.com) or [`https://t<tenant id>.certauth.login.microsoftonline.com`](`https://t<tenant id>.certauth.login.microsoftonline.com`) for Azure Global. For [Azure Government](../../azure-government/compare-azure-government-global-azure.md#guidance-for-developers), the certauth endpoint is [https://certauth.login.microsoftonline.us](https://certauth.login.microsoftonline.us).
52+
1. Once the user selects certificate-based authentication, the client is redirected to the certauth endpoint, which is [https://certauth.login.microsoftonline.com](https://certauth.login.microsoftonline.com) for Azure Global. For [Azure Government](../../azure-government/compare-azure-government-global-azure.md#guidance-for-developers), the certauth endpoint is [https://certauth.login.microsoftonline.us](https://certauth.login.microsoftonline.us).
5353

54-
The endpoint performs TLS mutual authentication, and requests the client certificate as part of the TLS handshake. You'll see an entry for this request in the Sign-ins log.
54+
However, with the issue hints feature enabled (coming soon), the new certauth endpoint will change to `https://t{tenantid}.certauth.login.microsoftonline.com`.
55+
56+
The endpoint performs TLS mutual authentication, and requests the client certificate as part of the TLS handshake. You'll see an entry for this request in the Sign-ins log.
5557

56-
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png" alt-text="Screenshot of the Sign-ins log in Microsoft Entra ID." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png":::
57-
5858
>[!NOTE]
59-
>The network administrator should allow access to the User sign-in page and certauth endpoint *.certauth.login.microsoftonline.com for the customer’s cloud environment. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
59+
>The network administrator should allow access to the User sign-in page and certauth endpoint `*.certauth.login.microsoftonline.com` for the customer's cloud environment. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
60+
61+
Customers should make sure their TLS inspection disablement also work for the new url with issuer hints. Our recommendation is not to hardcode the url with tenantId as for B2B users the tenantId might change. Use a regular expression to allow both the old and new URL to work for TLS inspection disablement. For example, use `*.certauth.login.microsoftonline.com` or `*certauth.login.microsoftonline.com`for Azure Global tenants, and `*.certauth.login.microsoftonline.us` or `*certauth.login.microsoftonline.us` for Azure Government tenants, depending on the proxy used.
6062

63+
Without this change, certificate-based authentication will fail when you enable Issuer Hints feature.
64+
65+
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png" alt-text="Screenshot of the Sign-ins log in Microsoft Entra ID." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png":::
66+
6167
Click the log entry to bring up **Activity Details** and click **Authentication Details**. You'll see an entry for the X.509 certificate.
6268

6369
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/entry.png" alt-text="Screenshot of the entry for X.509 certificate.":::

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -92,9 +92,7 @@ If you're assigned the *Authentication Administrator* role, you can require user
9292
1. Browse to **Identity** > **Users** > **All users**.
9393
1. Choose the user you wish to perform an action on and select **Authentication methods**. At the top of the window, then choose one of the following options for the user:
9494
- **Reset Password** resets the user's password and assigns a temporary password that must be changed on the next sign-in.
95-
- **Require Re-register MFA** makes it so that when the user signs in next time, they're requested to set up a new MFA authentication method.
96-
> [!NOTE]
97-
> The user's currently registered authentication methods aren't deleted when an admin requires re-registration for MFA. After a user re-registers for MFA, we recommend they review their security info and delete any previously registered authentication methods that are no longer usable.
95+
- **Require Re-register MFA** deactivates the user's hardware OATH tokens and deletes the following authentication methods from this user: phone numbers, Microsoft Authenticator apps and software OATH tokens. If needed, the user is requested to set up a new MFA authentication method the next time they sign in.
9896
- **Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it's required by the policy on the device.
9997

10098
:::image type="content" source="media/howto-mfa-userdevicesettings/manage-authentication-methods-in-azure.png" alt-text="Manage authentication methods from the Microsoft Entra admin center":::
@@ -119,3 +117,4 @@ To delete a user's app passwords, complete the following steps:
119117
This article showed you how to configure individual user settings. To configure overall Microsoft Entra multifactor authentication service settings, see [Configure Microsoft Entra multifactor authentication settings](howto-mfa-mfasettings.md).
120118

121119
If your users need help, see the [User guide for Microsoft Entra multifactor authentication](https://support.microsoft.com/account-billing/how-to-use-the-microsoft-authenticator-app-9783c865-0308-42fb-a519-8cf666fe0acc).
120+

articles/active-directory/authentication/troubleshoot-authentication-strengths.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/02/2023
9+
ms.date: 09/27/2023
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
14-
ms.reviewer: michmcla, inbarckms
14+
ms.reviewer: inbarckms
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -38,7 +38,7 @@ To verify if a method can be used:
3838
1. As needed, check if the tenant is enabled for any method required for the authentication strength. Click **Security** > **Multifactor Authentication** > **Additional cloud-based multifactor authentication settings**.
3939
1. Check which authentication methods are registered for the user in the Authentication methods policy. Click **Users and groups** > _username_ > **Authentication methods**.
4040

41-
If the user is registered for an enabled method that meets the authentication strength, they might need to use another method that isn't available after primary authentication, such as Windows Hello for Business or certificate-based authentication. For more information, see [How each authentication method works](concept-authentication-methods.md#how-each-authentication-method-works). The user needs to restart the session, choose **Sign-in options** , and select a method required by the authentication strength.
41+
If the user is registered for an enabled method that meets the authentication strength, they might need to use another method that isn't available after primary authentication, such as Windows Hello for Business. For more information, see [How each authentication method works](concept-authentication-methods.md#how-each-authentication-method-works). The user needs to restart the session, choose **Sign-in options** , and select a method required by the authentication strength.
4242

4343
:::image type="content" border="true" source="./media/troubleshoot-authentication-strengths/choose-another-method.png" alt-text="Screenshot of how to choose another sign-in method.":::
4444

articles/active-directory/develop/test-throttle-service-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ The following table lists Microsoft Entra throttling limits to consider when run
5555
| Limit type | Resource unit quota | Write quota |
5656
|-------------------|----------------|----------------|
5757
| application+tenant pair | S: 3500, M:5000, L:8000 per 10 seconds | 3000 per 2 minutes and 30 seconds |
58-
| application | 150,000 per 20 seconds | 70,000 per 5 minutes |
58+
| application | 150,000 per 20 seconds | 35,000 per 5 minutes |
5959
| tenant | Not Applicable | 18,000 per 5 minutes |
6060

6161
The application + tenant pair limit varies based on the number of users in the tenant requests are run against. The tenant sizes are defined as follows: S - under 50 users, M - between 50 and 500 users, and L - above 500 users.

0 commit comments

Comments
 (0)