Skip to content

Commit ebd82b8

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into yelevin/analytics-health-and-audit
2 parents 2355698 + cb0f8bb commit ebd82b8

File tree

1,214 files changed

+12781
-9232
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,214 files changed

+12781
-9232
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4416,6 +4416,11 @@
44164416
"redirect_url": "/azure/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api",
44174417
"redirect_document_id": false
44184418
},
4419+
{
4420+
"source_path_from_root": "/articles/active-directory/reports-monitoring/reference-reports-latencies.md",
4421+
"redirect_url": "/azure/active-directory/reports-monitoring/reference-azure-ad-sla-performance",
4422+
"redirect_document_id": false
4423+
},
44194424
{
44204425
"source_path_from_root": "/articles/active-directory/customize-branding.md",
44214426
"redirect_url": "/azure/active-directory/fundamentals/customize-branding",

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,11 @@
2525
"redirect_url": "/azure/azure-monitor/change/change-analysis",
2626
"redirect_document_id": false
2727
},
28+
{
29+
"source_path_from_root": "/articles/azure-monitor/app/legacy-pricing.md",
30+
"redirect_url": "/azure/azure-monitor/best-practices-cost",
31+
"redirect_document_id": false
32+
},
2833
{
2934
"source_path_from_root": "/articles/azure-monitor/app/snapshot-debugger.md",
3035
"redirect_url": "/azure/azure-monitor/snapshot-debugger/snapshot-debugger",

.openpublishing.redirection.json

Lines changed: 25 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13444,16 +13444,6 @@
1344413444
"redirect_url": "/azure/logic-apps/logic-apps-exception-handling",
1344513445
"redirect_document_id": false
1344613446
},
13447-
{
13448-
"source_path_from_root": "/articles/machine-learning/tutorial-power-bi-automated-model.md",
13449-
"redirect_url": "/azure/machine-learning/tutorial-power-bi-custom-model",
13450-
"redirect_document_id": false
13451-
},
13452-
{
13453-
"source_path_from_root": "/articles/machine-learning/tutorial-power-bi-designer-model.md",
13454-
"redirect_url": "/azure/machine-learning/tutorial-power-bi-custom-model",
13455-
"redirect_document_id": false
13456-
},
1345713447
{
1345813448
"source_path_from_root": "/articles/event-grid/cli-samples.md",
1345913449
"redirect_url": "/azure/event-grid/scripts/event-grid-cli-subscribe-custom-topic",
@@ -14109,6 +14099,26 @@
1410914099
"redirect_url": "/azure/scheduler/migrate-from-scheduler-to-logic-apps",
1411014100
"redirect_document_id": ""
1411114101
},
14102+
{
14103+
"source_path_from_root": "/articles/search/cognitive-search-tutorial-aml-designer-custom-skill.md",
14104+
"redirect_url": "/previous-versions/azure/search/cognitive-search-tutorial-aml-designer-custom-skill",
14105+
"redirect_document_id": false
14106+
},
14107+
{
14108+
"source_path_from_root": "/articles/search/cognitive-search-tutorial-aml-custom-skill.md",
14109+
"redirect_url": "/previous-versions/azure/search/cognitive-search-tutorial-aml-custom-skill",
14110+
"redirect_document_id": false
14111+
},
14112+
{
14113+
"source_path_from_root": "/articles/search/cognitive-search-custom-skill-form.md",
14114+
"redirect_url": "/previous-versions/azure/search/cognitive-search-custom-skill-form",
14115+
"redirect_document_id": false
14116+
},
14117+
{
14118+
"source_path_from_root": "/articles/search/cognitive-search-custom-skill-python.md",
14119+
"redirect_url": "/previous-versions/azure/search/cognitive-search-custom-skill-python",
14120+
"redirect_document_id": false
14121+
},
1411214122
{
1411314123
"source_path_from_root": "/articles/search/search-get-started-vs-code.md",
1411414124
"redirect_url": "/previous-versions/azure/search/search-get-started-vs-code",
@@ -22671,6 +22681,11 @@
2267122681
"redirect_URL": "/azure/route-server/tutorial-protect-route-server-ddos",
2267222682
"redirect_document_id": false
2267322683
},
22684+
{
22685+
"source_path": "articles/external-attack-surface-management/data-connections-overview.md",
22686+
"redirect_URL": "/azure/external-attack-surface-management/index",
22687+
"redirect_document_id": true
22688+
},
2267422689
{
2267522690
"source_path": "articles/virtual-network/nat-gateway/tutorial-protect-nat-gateway.md",
2267622691
"redirect_URL": "/azure/virtual-network/nat-gateway/tutorial-protect-nat-gateway-ddos",

articles/active-directory-b2c/identity-provider-facebook.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ If you don't already have a Facebook account, sign up at [https://www.facebook.c
5353
1. Select **Save Changes**.
5454
1. From the menu, select the **plus** sign or **Add Product** link next to **PRODUCTS**. Under the **Add Products to Your App**, select **Set up** under **Facebook Login**.
5555
1. From the menu, select **Facebook Login**, select **Settings**.
56-
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-name.onmicrosoft.com/oauth2/authresp`. Replace `your-tenant-name` with the name of your tenant, and `your-domain-name` with your custom domain.
56+
1. In **Valid OAuth redirect URIs**, enter `https://your-tenant-name.b2clogin.com/your-tenant-id/oauth2/authresp`. If you use a [custom domain](custom-domain.md), enter `https://your-domain-name/your-tenant-id/oauth2/authresp`. Replace `your-tenant-id` with the id of your tenant, and `your-domain-name` with your custom domain.
5757
1. Select **Save Changes** at the bottom of the page.
5858
1. To make your Facebook application available to Azure AD B2C, select the Status selector at the top right of the page and turn it **On** to make the Application public, and then select **Switch Mode**. At this point, the Status should change from **Development** to **Live**. For more information, see [Facebook App Development](https://developers.facebook.com/docs/development/release).
5959

@@ -135,4 +135,4 @@ If the sign-in process is successful, your browser is redirected to `https://jwt
135135
- Learn how to [pass Facebook token to your application](idp-pass-through-user-flow.md).
136136
- Check out the Facebook federation [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook), and how to pass Facebook access token [Live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook-with-access-token)
137137

138-
::: zone-end
138+
::: zone-end

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,9 +120,15 @@ sections:
120120
The browser caches the certificate after the certificate picker appears. If the user retries, the cached certificate is used automatically. The user should close the browser, and reopen a new session to try CBA again.
121121
122122
- question: |
123-
Why can't single-factor certificates be used to complete MFA?
123+
Why does not proof up for registering other auth methods come up when I use single factor certificates?
124124
answer: |
125-
There's no support for a second factor when the first factor is a single-factor certificate. We're working to add support for second factors.
125+
A user will be considered MFA capable when a user is in scope for Certificate-based authentication auth method. This means user will not be able to use proof up as part of their authentication to registerd other available methods and should have MFA via another method to register other available auth methods.
126+
127+
- question: |
128+
How can I use single-factor certificates to complete MFA?
129+
answer: |
130+
We have support for single factor CBA to get MFA. CBA SF + PSI (passwordless phone sign in) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
131+
[MFA with single factor certificates](../authentication/concept-certificate-based-authentication-technical-deep-dive.md#mfa-authentication-flow-using-single-factor-certificates-and-passwordless-sign-in)
126132
127133
- question: |
128134
Will the changes to the Authentication methods policy take effect immediately?

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ To work properly, phone numbers must be in the format *+CountryCode PhoneNumber*
3030
> [!NOTE]
3131
> There needs to be a space between the country/region code and the phone number.
3232
>
33-
> Password reset doesn't support phone extensions. Even in the *+1 4251234567X12345* format, extensions are removed before the call is placed.
33+
> Password reset and Azure AD Multi-Factor Authentication don't support phone extensions. Even in the *+1 4251234567X12345* format, extensions are removed before the call is placed.
3434
3535
## Mobile phone verification
3636

articles/active-directory/authentication/concept-certificate-based-authentication-migration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,9 @@ To configure Staged Rollout, follow these steps:
3939

4040
For more information, see [Staged Rollout](../hybrid/how-to-connect-staged-rollout.md).
4141

42+
>[!NOTE]
43+
> When Staged rollout is enabled for a user, the user is considered a managed user and all authentication will happen at Azure AD. For a federated Tenant, if CBA is enabled on Staged Rollout, password authentication only works if PHS is enabled too otherwise password authentication will fail.
44+
4245
## Use Azure AD connect to update certificateUserIds attribute
4346

4447
An AD FS admin can use **Synchronization Rules Editor** to create rules to sync the values of attributes from AD FS to Azure AD user objects. For more information, see [Sync rules for certificateUserIds](concept-certificate-based-authentication-certificateuserids.md#update-certificate-user-ids-using-azure-ad-connect).

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,9 +72,12 @@ Now we'll walk through each step:
7272
1. Azure AD completes the sign-in process by sending a primary refresh token back to indicate successful sign-in.
7373
1. If the user sign-in is successful, the user can access the application.
7474

75-
## Single-factor certificate-based authentication
75+
## MFA with Single-factor certificate-based authentication
7676

77-
Azure AD CBA supports second factors to meet MFA requirements with single-factor certificates. Users can use either passwordless sign-in or FIDO2 security keys as second factors when the first factor is single-factor CBA. Users need to register passwordless sign-in or FIDO2 in advance to signing in with Azure AD CBA.
77+
Azure AD CBA supports second factors to meet MFA requirements with single-factor certificates. Users can use either passwordless sign-in or FIDO2 security keys as second factors when the first factor is single-factor CBA. Users need to have another way to get MFA and register passwordless sign-in or FIDO2 in advance to signing in with Azure AD CBA.
78+
79+
>[!IMPORTANT]
80+
>A user will be considered MFA capable when a user is in scope for Certificate-based authentication auth method. This means user will not be able to use proof up as part of their authentication to registerd other available methods. More info on [Azure AD MFA](../authentication/concept-mfa-howitworks.md)
7881
7982
**Steps to set up passwordless phone signin(PSI) with CBA**
8083

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 01/31/2023
7+
ms.date: 02/03/2023
88
ms.author: justinha
9-
author: mjsantani
9+
author: justinha
1010
ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
@@ -305,7 +305,7 @@ GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationM
305305

306306
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?
307307

308-
Number match will be enabled for all users of Microsoft Authenticator after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
308+
Number match will be enabled for all users of Microsoft Authenticator push notifications after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
309309

310310
### Will the changes after February 27th, 2023, override number matching settings that are configured for a group in the Authentication methods policy?
311311

@@ -362,10 +362,6 @@ If the user has a different default authentication method, there won't be any ch
362362

363363
Regardless of their default method, any user who is prompted to sign-in with Authenticator push notifications will see number match after February 27th, 2023. If the user is prompted for another method, they won't see any change.
364364

365-
### Will users who don't use number matching be able to perform MFA?
366-
367-
It depends on how the **Enable and Target** tab is configured. The scope for number match approvals will change under the **Configure** tab to include everyone, but it only applies for users and groups targeted on the **Enable and Target** tab for Push or Any. However, if Target on the **Enable and Target** tab is set to specific groups for Push or Any, and the user isn't a member of those groups, then they won't receive the number matching approvals once the change is implemented after February 27th, 2023 because they aren't a member of the groups defined on the **Enable and Target** tab for Push and/or Any.
368-
369365
### Is number matching supported with MFA Server?
370366

371367
No, number matching isn't enforced because it's not a supported feature for MFA Server, which is [deprecated](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/microsoft-entra-change-announcements-september-2022-train/ba-p/2967454).

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-add-remove-user-to-group.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ This article describes how you can add or remove a new user for a group in Permi
2121
2222
## Add a user
2323

24-
1. Navigate to the [Microsoft Entra admin center](https://entr.microsoft.com/#home).
24+
1. Navigate to the [Microsoft Entra admin center](https://entra.microsoft.com/#home).
2525
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
2626
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
2727
1. Select the group name for the group you want to add the user to.
@@ -37,7 +37,7 @@ This article describes how you can add or remove a new user for a group in Permi
3737

3838
## Remove a user
3939

40-
1. Navigate to the Microsoft [Entra admin center](https://entr.microsoft.com/#home).
40+
1. Navigate to the Microsoft [Entra admin center](https://entra.microsoft.com/#home).
4141
1. From the Azure Active Directory tile, select **Go to Azure Active Directory**.
4242
1. From the navigation pane, select the **Groups** drop-down menu, then **All groups**.
4343
1. Select the group name for the group you want to remove the user from.

0 commit comments

Comments
 (0)