Skip to content

Commit ed6b713

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 2929397 + 554bb8e commit ed6b713

File tree

271 files changed

+2507
-8091
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

271 files changed

+2507
-8091
lines changed

.openpublishing.redirection.json

Lines changed: 335 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/howto-authentication-passwordless-security-key.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Passwordless security key sign (preview) - Azure Active Directory
2+
title: Passwordless security key sign-in (preview) - Azure Active Directory
33
description: Enable passwordless security key sign-in to Azure AD using FIDO2 security keys (preview)
44

55
services: active-directory

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -123,13 +123,13 @@ The sign-in activity reports for MFA give you access to the following informatio
123123

124124
First, ensure that you have the [MSOnline V1 PowerShell module](https://docs.microsoft.com/powershell/azure/active-directory/overview?view=azureadps-1.0) installed.
125125

126-
Identify users who have registered for MFA using the PowerShell that follows.
126+
Identify users who have registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts cannot authenticate against Azure AD.
127127

128-
```Get-MsolUser -All | Where-Object {$_.StrongAuthenticationMethods -ne $null} | Select-Object -Property UserPrincipalName```
128+
```Get-MsolUser -All | Where-Object {$.StrongAuthenticationMethods -ne $null -and $.BlockCredential -eq $False} | Select-Object -Property UserPrincipalName```
129129

130-
Identify users who have not registered for MFA using the PowerShell that follows.
130+
Identify users who have not registered for MFA using the PowerShell that follows. This set of commands excludes disabled users since these accounts cannot authenticate against Azure AD.
131131

132-
```Get-MsolUser -All | Where-Object {$_.StrongAuthenticationMethods.Count -eq 0} | Select-Object -Property UserPrincipalName```
132+
```Get-MsolUser -All | Where-Object {$.StrongAuthenticationMethods.Count -eq 0 -and $.BlockCredential -eq $False} | Select-Object -Property UserPrincipalName```
133133

134134
Identify users and output methods registered.
135135

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/25/2020
9+
ms.date: 03/20/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -104,6 +104,8 @@ The safety feature is necessary because *block all users and all cloud apps* has
104104

105105
You can satisfy this safety feature by excluding one user from your policy. Ideally, you should define a few [emergency-access administrative accounts in Azure AD](../users-groups-roles/directory-emergency-access.md) and exclude them from your policy.
106106

107+
Using [report-only mode](concept-conditional-access-report-only.md) when enabling your policy to block legacy authentication provides your organization an opportunity to monitor what the impact of the policy would be.
108+
107109
## Policy deployment
108110

109111
Before you put your policy into production, take care of:
@@ -133,5 +135,6 @@ If you block legacy authentication using the **Other clients** condition, you ca
133135

134136
## Next steps
135137

138+
- [Determine impact using Conditional Access report-only mode](howto-conditional-access-report-only.md)
136139
- If you are not familiar with configuring Conditional Access policies yet, see [require MFA for specific apps with Azure Active Directory Conditional Access](app-based-mfa.md) for an example.
137140
- For more information about modern authentication support, see [How modern authentication works for Office 2013 and Office 2016 client apps](/office365/enterprise/modern-auth-for-office-2013-and-2016)

articles/active-directory/conditional-access/howto-conditional-access-report-only.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/11/2020
9+
ms.date: 03/20/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -19,6 +19,9 @@ ms.collection: M365-identity-device-management
1919

2020
To configure a Conditional Access policy in report-only mode:
2121

22+
> [!IMPORTANT]
23+
> If your organization has not already, [Set up Azure Monitor integration with Azure AD](#set-up-azure-monitor-integration-with-azure-ad). This process must take place before data will be available to review.
24+
2225
1. Sign into the **Azure portal** as a Conditional Access administrator, security administrator, or global administrator.
2326
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
2427
1. Select **New policy**.
@@ -52,7 +55,7 @@ More information about Azure Monitor pricing can be found on the [Azure Monitor
5255

5356
## View Conditional Access Insights workbook
5457

55-
Once youve integrated your Azure AD logs with Azure Monitor, you can monitor the impact of Conditional Access policies using the new Conditional Access insights workbooks.
58+
Once you've integrated your Azure AD logs with Azure Monitor, you can monitor the impact of Conditional Access policies using the new Conditional Access insights workbooks.
5659

5760
1. Sign into the **Azure portal** as a security administrator or global administrator.
5861
1. Browse to **Azure Active Directory** > **Workbooks**.
@@ -75,9 +78,9 @@ Once you’ve integrated your Azure AD logs with Azure Monitor, you can monitor
7578

7679
Customers have noticed that queries sometimes fail if the wrong or multiple workspaces are associated with the workbook. To fix this problem, click **Edit** at the top of the workbook and then the Settings gear. Select and then remove workspaces that are not associated with the workbook. There should be only one workspace associated with each workbook.
7780

78-
### Why doesnt the Conditional Access Policies dropdown parameter contain my policies?
81+
### Why doesn't the Conditional Access Policies dropdown parameter contain my policies?
7982

80-
The Conditional Access Policies dropdown is populated by querying the most recent sign-ins over a period of 4 hours. If a tenant doesnt have any sign-ins in the past 4 hours, it is possible that the dropdown will be empty. If this delay is a persistent problem, such as in small tenants with infrequent sign-ins, admins can edit the query for the Conditional Access Policies dropdown and extend the time for the query to a time longer than 4 hours.
83+
The Conditional Access Policies dropdown is populated by querying the most recent sign-ins over a period of 4 hours. If a tenant doesn't have any sign-ins in the past 4 hours, it is possible that the dropdown will be empty. If this delay is a persistent problem, such as in small tenants with infrequent sign-ins, admins can edit the query for the Conditional Access Policies dropdown and extend the time for the query to a time longer than 4 hours.
8184

8285
## Next steps
8386

articles/active-directory/develop/authentication-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ Depending on how your client is built, it can use one (or several) of the authen
8383
|[Authorization code flow](v2-oauth2-auth-code-flow.md) | | x | x | x | x|
8484
|[Implicit flow](v2-oauth2-implicit-grant-flow.md) | | x | x | | |
8585
|[Hybrid OIDC flow](v2-protocols-oidc.md#get-access-tokens)| | x | | | x |
86-
|[Refresh token redemption](v2-oauth2-auth-code-flow.md#refreshing-the-access-tokens) | refresh token | x | x | x| |
86+
|[Refresh token redemption](v2-oauth2-auth-code-flow.md#refresh-the-access-token) | refresh token | x | x | x| |
8787
|[On-behalf-of flow](v2-oauth2-on-behalf-of-flow.md) | access token| x| x| x| |
8888
|[Client credentials](v2-oauth2-client-creds-grant-flow.md) | | | x (app-only)| | |
8989

articles/active-directory/develop/reference-app-manifest.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -244,7 +244,8 @@ Example value:
244244
Specifies what Microsoft accounts are supported for the current application. Supported values are:
245245
- **AzureADMyOrg** - Users with a Microsoft work or school account in my organization's Azure AD tenant (for example, single tenant)
246246
- **AzureADMultipleOrgs** - Users with a Microsoft work or school account in any organization's Azure AD tenant (for example, multi-tenant)
247-
- **AzureADandPersonalMicrosoftAccount** - Users with a personal Microsoft account, or a work or school account in any organization's Azure AD tenant
247+
- **AzureADandPersonalMicrosoftAccount** - Users with a personal Microsoft account, or a work or school account in any organization's Azure AD tenant
248+
- **PersonalMicrosoftAccount** - Personal accounts that are used to sign in to services like Xbox and Skype.
248249

249250
Example value:
250251
`AzureADandPersonalMicrosoftAccount`

articles/active-directory/develop/supported-accounts-validation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The value you select for this property has implications on other app object prop
2929

3030
See the following table for the validation differences of various properties for different supported account types.
3131

32-
| Property | `AzureADMyOrg` | `AzureADMultipleOrgs` | `AzureADandPersonalMicrosoftAccount` |
32+
| Property | `AzureADMyOrg` | `AzureADMultipleOrgs` | `AzureADandPersonalMicrosoftAccount` and `PersonalMicrosoftAccount` |
3333
|--------------|---------------|----------------|----------------|
3434
| Application ID URI (`identifierURIs`) | Must be unique in the tenant <br><br> urn:// schemes are supported <br><br> Wildcards are not supported <br><br> Query strings and fragments are supported <br><br> Maximum length of 255 characters <br><br> No limit* on number of identifierURIs | Must be globally unique <br><br> urn:// schemes are supported <br><br> Wildcards are not supported <br><br> Query strings and fragments are supported <br><br> Maximum length of 255 characters <br><br> No limit* on number of identifierURIs | Must be globally unique <br><br> urn:// schemes are not supported <br><br> Wildcards, fragments and query strings are not supported <br><br> Maximum length of 120 characters <br><br> Maximum of 50 identifierURIs |
3535
| Certificates (`keyCredentials`) | Symmetric signing key | Symmetric signing key | Encryption and asymmetric signing key |

articles/active-directory/devices/hybrid-azuread-join-plan.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,9 @@ If your Windows 10 domain joined devices are [Azure AD registered](overview.md#g
100100
### Additional considerations
101101
- If your environment uses virtual desktop infrastructure (VDI), see [Device identity and desktop virtualization](/azure/active-directory/devices/howto-device-identity-virtual-desktop-infrastructure).
102102

103-
- Hybrid Azure AD join is supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Hybrid Azure AD join. Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support. Starting from Windows 10 1903 release, TPMs 1.2 are not used for hybrid Azure AD join and devices with those TPMs will be considered as if they don't have a TPM.
103+
- Hybrid Azure AD join is supported for FIPS-compliant TPM 2.0 and not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Hybrid Azure AD join. Microsoft does not provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Please contact your hardware OEM for support.
104+
105+
- Starting from Windows 10 1903 release, TPMs 1.2 are not used with hybrid Azure AD join and devices with those TPMs will be considered as if they don't have a TPM.
104106

105107
## Review controlled validation of hybrid Azure AD join
106108

articles/active-directory/fundamentals/license-users-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
# Assign or remove licenses in the Azure Active Directory portal
2121

22-
Many Azure Active Directory (Azure AD) services require you to license each of your users or groups (and associated members) for that service. Only users with active licenses will be able to access and use the licensed Azure AD services for which that's true.
22+
Many Azure Active Directory (Azure AD) services require you to license each of your users or groups (and associated members) for that service. Only users with active licenses will be able to access and use the licensed Azure AD services for which that's true. Licenses are applied per tenant and do not transfer to other tenants.
2323

2424
## Available license plans
2525

0 commit comments

Comments
 (0)