Skip to content

Commit ec24928

Browse files
committed
2 parents 792af70 + 6b99b8e commit ec24928

File tree

801 files changed

+4387
-3241
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

801 files changed

+4387
-3241
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3666,6 +3666,11 @@
36663666
"redirect_url": "/azure/architecture",
36673667
"redirect_document_id": false
36683668
},
3669+
{
3670+
"source_path": "articles/azure-monitor/azure-monitor-log-hub.md",
3671+
"redirect_url": "/azure/azure-monitor/overview",
3672+
"redirect_document_id": false
3673+
},
36693674
{
36703675
"source_path": "articles/cloud-services/cloud-services-dotnet-diagnostics-storage.md",
36713676
"redirect_url": "/azure/azure-monitor/platform/diagnostics-extension-to-storage",
@@ -48976,6 +48981,11 @@
4897648981
"source_path": "articles/aks/acs-aks-migration.md",
4897748982
"redirect_url": "/azure/aks/aks-migration",
4897848983
"redirect_document_id": false
48984+
},
48985+
{
48986+
"source_path": "articles/service-fabric/service-fabric-cicd-your-linux-applications-with-jenkins.md",
48987+
"redirect_url": "/azure/jenkins/service-fabric-cicd-your-linux-applications-with-jenkins",
48988+
"redirect_document_id": true
4897948989
}
4898048990
]
4898148991
}

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -350,8 +350,9 @@
350350
- name: Azure Monitor
351351
href: azure-monitor.md
352352
displayName: log, logs, logging, usage, events
353-
- name: Account management
353+
- name: Manage users - Microsoft Graph
354354
href: manage-user-accounts-graph-api.md
355+
displayName: account, accounts
355356
- name: Deploy with Azure Pipelines
356357
href: deploy-custom-policies-devops.md
357358
displayName: azure devops, ci/cd, cicd, custom policy, policies

articles/active-directory-b2c/phone-authentication.md

Lines changed: 26 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,35 @@
11
---
2-
title: Phone sign-up and sign-in with custom policies
2+
title: Phone sign-up and sign-in with custom policies (Preview)
33
titleSuffix: Azure AD B2C
4-
description: Learn how to send one-time passwords in text messages to your application users' phones with custom policies in Azure Active Directory B2C.
4+
description: Send one-time passwords (OTP) in text messages to your application users' phones with custom policies in Azure Active Directory B2C.
55
services: active-directory-b2c
66
author: mmacy
77
manager: celestedg
88

99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 12/17/2019
12+
ms.date: 02/25/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
1616

17-
# Set up phone sign-up and sign-in with custom policies in Azure AD B2C
17+
# Set up phone sign-up and sign-in with custom policies in Azure AD B2C (Preview)
1818

1919
Phone sign-up and sign-in in Azure Active Directory B2C (Azure AD B2C) enables your users to sign up and sign in to your applications by using a one-time password (OTP) sent in a text message to their phone. One-time passwords can help minimize the risk of your users forgetting or having their passwords compromised.
2020

2121
Follow the steps in this article to use the custom policies to enable your customers to sign up and sign in to your applications by using a one-time password sent to their phone.
2222

2323
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
2424

25+
## Pricing
26+
27+
One-time passwords are sent to your users by using SMS text messages, and you may be charged for each message sent. For pricing information, see the **Separate Charges** section of [Azure Active Directory B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/).
28+
2529
## Prerequisites
2630

31+
You need the following resources in place before setting up OTP.
32+
2733
* [Azure AD B2C tenant](tutorial-create-tenant.md)
2834
* [Web application registered](tutorial-register-applications.md) in your tenant
2935
* [Custom policies](custom-policy-get-started.md) uploaded to your tenant
@@ -66,6 +72,22 @@ As you upload each file, Azure adds the prefix `B2C_1A_`.
6672
1. Select **Run now** and sign up using an email address or a phone number.
6773
1. Select **Run now** once again and sign in with the same account to confirm that you have the correct configuration.
6874

75+
## Get user account by phone number
76+
77+
A user that signs up with a phone number but does not provide a recovery email address is recorded in your Azure AD B2C directory with their phone number as their sign-in name. If the user then wishes to change their phone number, your help desk or support team must first find their account, and then update their phone number.
78+
79+
You can find a user by their phone number (sign-in name) by using [Microsoft Graph](manage-user-accounts-graph-api.md):
80+
81+
```http
82+
GET https://graph.microsoft.com/v1.0/users?$filter=identities/any(c:c/issuerAssignedId eq '+{phone number}' and c/issuer eq '{tenant name}.onmicrosoft.com')
83+
```
84+
85+
For example:
86+
87+
```http
88+
GET https://graph.microsoft.com/v1.0/users?$filter=identities/any(c:c/issuerAssignedId eq '+450334567890' and c/issuer eq 'contosob2c.onmicrosoft.com')
89+
```
90+
6991
## Next steps
7092

7193
You can find the phone sign-up and sign-in custom policy starter pack (and other starter packs) on GitHub:

articles/active-directory-b2c/stringcollection-transformations.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/03/2020
12+
ms.date: 02/27/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -22,13 +22,13 @@ This article provides examples for using the string collection claims transforma
2222

2323
## AddItemToStringCollection
2424

25-
Adds a string claim to a new stringCollection claim.
25+
Adds a string claim to a new unique values stringCollection claim.
2626

2727
| Item | TransformationClaimType | Data Type | Notes |
2828
| ---- | ----------------------- | --------- | ----- |
2929
| InputClaim | item | string | The ClaimType to be added to the output claim. |
3030
| InputClaim | collection | stringCollection | [Optional] If specified, the claims transformation copies the items from this collection, and adds the item to the end of the output collection claim. |
31-
| OutputClaim | collection | stringCollection | The ClaimTypes that are produced after this ClaimsTransformation has been invoked. |
31+
| OutputClaim | collection | stringCollection | The ClaimType that is produced after this claims transformation has been invoked, with the value specified in the input claim. |
3232

3333
Use this claims transformation to add a string to a new or existing stringCollection. It's commonly used in a **AAD-UserWriteUsingAlternativeSecurityId** technical profile. Before a new social account is created, **CreateOtherMailsFromEmail** claims transformation reads the ClaimType and adds the value to the **otherMails** ClaimType.
3434

@@ -56,13 +56,13 @@ The following claims transformation adds the **email** ClaimType to **otherMails
5656

5757
## AddParameterToStringCollection
5858

59-
Adds a string parameter to a new stringCollection claim.
59+
Adds a string parameter to a new unique values stringCollection claim.
6060

6161
| Item | TransformationClaimType | Data Type | Notes |
6262
| ---- | ----------------------- | --------- | ----- |
6363
| InputClaim | collection | stringCollection | [Optional] If specified, the claims transformation copies the items from this collection, and adds the item to the end of the output collection claim. |
6464
| InputParameter | item | string | The value to be added to the output claim. |
65-
| OutputClaim | collection | stringCollection | The ClaimTypes that will be produced after this ClaimsTransformation has been invoked. |
65+
| OutputClaim | collection | stringCollection | The ClaimType that is produced after this claims transformation has been invoked, with the value specified in the input parameter. |
6666

6767
Use this claims transformation to add a string value to a new or existing stringCollection. The following example adds a constant email address ([email protected]) to the **otherMails** claim.
6868

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ The following table provides a list of the features that are available in the va
3939

4040
| Feature | Azure AD Free - Security defaults | Azure AD Free - Azure AD Global Administrators | Office 365 Business Premium, E3, or E5 | Azure AD Premium P1 or P2 |
4141
| --- |:---:|:---:|:---:|:---:|
42-
| Protect Azure AD admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) |||
42+
| Protect Azure AD tenant admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) |||
4343
| Mobile app as a second factor |||||
4444
| Phone call as a second factor | ||||
4545
| SMS as a second factor | ||||

articles/active-directory/cloud-provisioning/reference-cloud-provisioning-faq.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: daveba
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 12/02/2019
10+
ms.date: 02/26/2020
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -66,6 +66,14 @@ No, cloud provisioning does not support writeback of ms-ds-consistencyGUID for a
6666

6767
When you delete the configuration, cloud provisioning does not cleanup the synced objects in Azure AD. To ensure you do not have the old objects, change the scope of the configuration to an empty group or Organizational Units. Once the provisioning runs and cleans up the objects, disable and delete the configuration.
6868

69+
**Q: What does it mean that Exchange hybrid is not supported?**
70+
71+
The Exchange Hybrid Deployment feature allows for the co-existence of Exchange mailboxes both on-premises and in Office 365. Azure AD Connect is synchronizing a specific set of attributes from Azure AD back into your on-premises directory. The cloud provisioning agent currently does not synchronize these attributes back into your on-premises directory and thus it is not supported as a replacement for Azure AD Connect.
72+
73+
**Q: Can I install the cloud provisioning agent on Windows Server Core?**
74+
75+
No, installing the agent on server core is not supported.
76+
6977
## Next steps
7078

7179
- [What is provisioning?](what-is-provisioning.md)

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/21/2020
9+
ms.date: 02/26/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -52,7 +52,7 @@ Selecting this checkbox will require users to perform Azure Multi-Factor Authent
5252

5353
Organizations who have deployed Microsoft Intune can use the information returned from their devices to identify devices that meet specific compliance requirements. This policy compliance information is forwarded from Intune to Azure AD where Conditional Access can make decisions to grant or block access to resources. For more information about compliance policies, see the article [Set rules on devices to allow access to resources in your organization using Intune](https://docs.microsoft.com/intune/protect/device-compliance-get-started).
5454

55-
A device can be marked as compliant by Intune (for any device OS) or by third-party MDM system for Windows 10 devices. Third-party MDM systems for device OS types other than Windows 10 are not supported.
55+
A device can be marked as compliant by Intune (for any device OS) or by third-party MDM system for Windows 10 devices. Jamf pro is the only supported third-party MDM system. More information about integration can be found in the article, [Integrate Jamf Pro with Intune for compliance](/intune/protect/conditional-access-integrate-jamf).
5656

5757
Devices must be registered in Azure AD before they can be marked as compliant. More information about device registration can be found in the article, [What is a device identity](../devices/overview.md).
5858

articles/active-directory/develop/howto-authenticate-service-principal-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ You can set the scope at the level of the subscription, resource group, or resou
4646

4747
## Create service principal with self-signed certificate
4848

49-
The following example covers a simple scenario. It uses [New-​AzAD​Service​Principal](/powershell/module/az.resources/new-azadserviceprincipal) to create a service principal with a self-signed certificate, and uses [New-​Azure​Rm​Role​Assignment](/powershell/module/az.resources/new-azroleassignment) to assign the [Reader](/azure/role-based-access-control/built-in-roles#reader) role to the service principal. The role assignment is scoped to your currently selected Azure subscription. To select a different subscription, use [Set-AzContext](/powershell/module/Az.Accounts/Set-AzContext).
49+
The following example covers a simple scenario. It uses [New-​AzAD​Service​Principal](/powershell/module/az.resources/new-azadserviceprincipal) to create a service principal with a self-signed certificate, and uses [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment) to assign the [Reader](/azure/role-based-access-control/built-in-roles#reader) role to the service principal. The role assignment is scoped to your currently selected Azure subscription. To select a different subscription, use [Set-AzContext](/powershell/module/Az.Accounts/Set-AzContext).
5050

5151
> [!NOTE]
5252
> The New-SelfSignedCertificate cmdlet and the PKI module are currently not supported in PowerShell Core.

articles/active-directory/develop/howto-create-service-principal-portal.md

Lines changed: 22 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
12-
ms.date: 10/14/2019
12+
ms.date: 02/26/2020
1313
ms.author: ryanwi
1414
ms.reviewer: tomfitz
1515
ms.custom: aaddev, seoapril2019, identityplatformtop40
@@ -81,16 +81,26 @@ Daemon applications can use two forms of credentials to authenticate with Azure
8181

8282
### Upload a certificate
8383

84-
You can use an existing certificate if you have one. Optionally, you can create a self-signed certificate for testing purposes. Open PowerShell and run [New-SelfSignedCertificate](/powershell/module/pkiclient/new-selfsignedcertificate) with the following parameters to create a self-signed certificate in the user certificate store on your computer:
84+
You can use an existing certificate if you have one. Optionally, you can create a self-signed certificate for *testing purposes only*. Open PowerShell and run [New-SelfSignedCertificate](/powershell/module/pkiclient/new-selfsignedcertificate) with the following parameters to create a self-signed certificate in the user certificate store on your computer:
8585

8686
```powershell
8787
$cert=New-SelfSignedCertificate -Subject "CN=DaemonConsoleCert" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature
8888
```
8989

9090
Export this certificate to a file using the [Manage User Certificate](/dotnet/framework/wcf/feature-details/how-to-view-certificates-with-the-mmc-snap-in) MMC snap-in accessible from the Windows Control Panel.
9191

92+
1. Select **Run** from the **Start** menu, and then enter **certmgr.msc**.
93+
94+
The Certificate Manager tool for the current user appears.
95+
96+
1. To view your certificates, under **Certificates - Current User** in the left pane, expand the **Personal** directory.
97+
1. Right-click on the cert you created, select **All tasks->Export**.
98+
1. Follow the Certificate Export wizard. Export the private key, specify a password for the cert file, and export to a file.
99+
92100
To upload the certificate:
93101

102+
1. Select **Azure Active Directory**.
103+
1. From **App registrations** in Azure AD, select your application.
94104
1. Select **Certificates & secrets**.
95105
1. Select **Upload certificate** and select the certificate (an existing certificate or the self-signed certificate you exported).
96106

@@ -142,15 +152,21 @@ In your Azure subscription, your account must have `Microsoft.Authorization/*/Wr
142152

143153
To check your subscription permissions:
144154

145-
1. Select your account in the upper right corner, and select **... -> My permissions**.
155+
1. Search for and select **Subscriptions**, or select **Subscriptions** on the **Home** page.
146156

147-
![Select your account and your user permissions](./media/howto-create-service-principal-portal/select-my-permissions.png)
157+
![Search](./media/howto-create-service-principal-portal/select-subscription.png)
158+
159+
1. Select the subscription you want to create the service principal in.
160+
161+
![Select subscription for assignment](./media/howto-create-service-principal-portal/select-one-subscription.png)
162+
163+
If you don't see the subscription you're looking for, select **global subscriptions filter**. Make sure the subscription you want is selected for the portal.
148164

149-
1. From the drop-down list, select the subscription you want to create the service principal in. Then, select **Click here to view complete access details for this subscription**.
165+
1. Select **My permissions**. Then, select **Click here to view complete access details for this subscription**.
150166

151167
![Select the subscription you want to create the service principal in](./media/howto-create-service-principal-portal/view-details.png)
152168

153-
1. Select **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign a role to an AD app. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned the Owner role, which means that user has adequate permissions.
169+
1. Select **View** in **Role assignments** to view your assigned roles, and determine if you have adequate permissions to assign a role to an AD app. If not, ask your subscription administrator to add you to User Access Administrator role. In the following image, the user is assigned the Owner role, which means that user has adequate permissions.
154170

155171
![This example shows the user is assigned the Owner role](./media/howto-create-service-principal-portal/view-user-role.png)
156172

75.3 KB
Loading

0 commit comments

Comments
 (0)