Skip to content

Commit ec70c79

Browse files
authored
Merge pull request #233160 from cilwerner/dirty-pr-release-msid-gtd-tutorial-web-app-redirect-json
[GTD] DIRTY PR release msid gtd tutorial web app TOC
2 parents 00d0f8f + 379d1a7 commit ec70c79

File tree

258 files changed

+3243
-1028
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

258 files changed

+3243
-1028
lines changed

.openpublishing.publish.config.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1002,8 +1002,6 @@
10021002
".openpublishing.redirection.baremetal-infrastructure.json",
10031003
".openpublishing.redirection.defender-for-cloud.json",
10041004
".openpublishing.redirection.defender-for-iot.json",
1005-
".openpublishing.redirection.deployment-environments.json",
1006-
".openpublishing.redirection.dev-box.json",
10071005
".openpublishing.redirection.healthcare-apis.json",
10081006
".openpublishing.redirection.iot-hub-device-update.json",
10091007
".openpublishing.redirection.json",
@@ -1060,6 +1058,8 @@
10601058
"articles/stream-analytics/.openpublishing.redirection.stream-analytics.json",
10611059
"articles/synapse-analytics/.openpublishing.redirection.synapse-analytics.json",
10621060
"articles/virtual-machine-scale-sets/.openpublishing.redirection.virtual-machine-scale-sets.json",
1063-
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json"
1061+
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json",
1062+
"articles/dev-box/.openpublishing.redirection.dev-box.json",
1063+
"articles/deployment-environments/.openpublishing.redirection.deployment-environments.json"
10641064
]
10651065
}

.openpublishing.redirection.dev-box.json

Lines changed: 0 additions & 19 deletions
This file was deleted.

articles/active-directory-b2c/billing.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,8 @@ Usage charges for Azure AD B2C are billed to an Azure subscription. You need to
7474

7575
A subscription linked to an Azure AD B2C tenant can be used for the billing of Azure AD B2C usage or other Azure resources, including additional Azure AD B2C resources. It can't be used to add other Azure license-based services or Office 365 licenses within the Azure AD B2C tenant.
7676

77+
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-create-subscription.md)]
78+
7779
### Prerequisites
7880

7981
* [Azure subscription](https://azure.microsoft.com/free/)

articles/active-directory-b2c/manage-users-portal.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,10 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/24/2023
11+
ms.date: 03/30/2023
1212
ms.author: godonnell
1313
ms.subservice: B2C
14+
ms.custom: "b2c-support"
1415
---
1516

1617
# Use the Azure portal to create and delete consumer users in Azure AD B2C
@@ -34,7 +35,7 @@ This article focuses on working with **consumer accounts** in the Azure portal.
3435
1. Sign in to the [Azure portal](https://portal.azure.com).
3536
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
3637
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
37-
1. In the left menu, select **Azure AD B2C**. Or, select **All services** and search for and select **Azure AD B2C**.
38+
1. In the left menu, select **Azure Active Directory**. Or, select **All services** and search for and select **Azure Active Directory**.
3839
1. Under **Manage**, select **Users**.
3940
1. Select **New user**.
4041
1. Select **Create Azure AD B2C user**.

articles/active-directory-b2c/tutorial-create-tenant.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,11 @@ Before you create your Azure AD B2C tenant, you need to take the following consi
4040

4141
- An Azure account that's been assigned at least the [Contributor](../role-based-access-control/built-in-roles.md) role within the subscription or a resource group within the subscription is required.
4242

43+
[!INCLUDE [active-directory-b2c-choose-user-flow-or-custom-policy](../../includes/active-directory-b2c-create-subscription.md)]
44+
4345
## Create an Azure AD B2C tenant
4446
>[!NOTE]
45-
>If you're unable to create Azure AD B2C tenant, [review your user settings page](tenant-management-check-tenant-creation-permission.md) to ensure that tenant creation isn't switched off. If tenant creation is switched off, ask your _Global Administrator_ to assign you a _Tenant Creator_ role.
47+
>If you're unable to create Azure AD B2C tenant, [review your user settings page](tenant-management-check-tenant-creation-permission.md) to ensure that tenant creation isn't switched off. If tenant creation is switched on, ask your _Global Administrator_ to assign you a _Tenant Creator_ role.
4648
4749
1. Sign in to the [Azure portal](https://portal.azure.com/).
4850

articles/active-directory/authentication/concept-password-ban-bad-combined-policy.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 03/06/2023
9+
ms.date: 04/02/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -50,9 +50,8 @@ The following expiration requirements apply to other providers that use Azure AD
5050

5151
| Property | Requirements |
5252
| --- | --- |
53-
| Password expiry duration (Maximum password age) |<ul><li>Default value: **90** days.</li><li>The value is configurable by using the `Set-MsolPasswordPolicy` cmdlet from the Azure Active Directory Module for Windows PowerShell.</li></ul> |
54-
| Password expiry notification (When users are notified of password expiration) |<ul><li>Default value: **14** days (before password expires).</li><li>The value is configurable by using the `Set-MsolPasswordPolicy` cmdlet.</li></ul> |
55-
| Password expiry (Let passwords never expire) |<ul><li>Default value: **false** (indicates that password's have an expiration date).</li><li>The value can be configured for individual user accounts by using the `Set-MsolUser` cmdlet.</li></ul> |
53+
| Password expiry duration (Maximum password age) |Default value: **90** days.<br>The value is configurable by using the `Set-MsolPasswordPolicy` cmdlet from the Azure Active Directory Module for Windows PowerShell. |
54+
| Password expiry (Let passwords never expire) |Default value: **false** (indicates that password's have an expiration date).<br>The value can be configured for individual user accounts by using the `Set-MsolUser` cmdlet.|
5655

5756
## Next steps
5857

articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use system-preferred multifactor authentication
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 03/31/2023
7+
ms.date: 04/03/2023
88
ms.author: justinha
99
author: justinha
1010
manager: amycolannino
@@ -27,7 +27,20 @@ After system-preferred MFA is enabled, the authentication system does all the wo
2727
>[!NOTE]
2828
>System-preferred MFA is a key security upgrade to traditional second factor notifications. We highly recommend enabling system-preferred MFA in the near term for improved sign-in security.
2929
30-
## Enable system-preferred MFA
30+
## Enable system-preferred MFA in the Azure portal
31+
32+
By default, system-preferred MFA is Microsoft managed and disabled for all users.
33+
34+
1. In the Azure portal, click **Security** > **Authentication methods** > **Settings**.
35+
1. For **System-preferred multifactor authentication**, choose whether to explicitly enable or disable the feature, and include or exclude any users. Excluded groups take precedence over include groups.
36+
37+
For example, the following screenshot shows how to make system-preferred MFA explicitly enabled for only the Engineering group.
38+
39+
:::image type="content" border="true" source="./media/concept-system-preferred-multifactor-authentication/enable.png" alt-text="Screenshot of how to enable Microsoft Authenticator settings for Push authentication mode.":::
40+
41+
1. After you finish making any changes, click **Save**.
42+
43+
## Enable system-preferred MFA using Graph APIs
3144

3245
To enable system-preferred MFA in advance, you need to choose a single target group for the schema configuration, as shown in the [Request](#request) example.
3346

@@ -47,7 +60,7 @@ System-preferred MFA can be enabled only for a single group, which can be a dyna
4760

4861
| Property | Type | Description |
4962
|----------|------|-------------|
50-
| id | String | ID of the entity targeted. |
63+
| ID | String | ID of the entity targeted. |
5164
| targetType | featureTargetType | The kind of entity targeted, such as group, role, or administrative unit. The possible values are: 'group', 'administrativeUnit', 'role', 'unknownFutureValue'. |
5265

5366
Use the following API endpoint to enable **systemCredentialPreferences** and include or exclude groups:
19.5 KB
Loading

0 commit comments

Comments
 (0)