Skip to content

Commit ef7393b

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into ml-sc-auth
2 parents 06fa0d0 + 4e12af4 commit ef7393b

File tree

1,458 files changed

+46800
-35750
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,458 files changed

+46800
-35750
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,16 @@
3030
"redirect_url": "/azure/azure-monitor/change/change-analysis",
3131
"redirect_document_id": false
3232
},
33+
{
34+
"source_path_from_root": "/articles/azure-monitor/app/visual-studio.md",
35+
"redirect_url": "https://learn.microsoft.com/visualstudio/azure/azure-app-insights-add-connected-service",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/app/visual-studio-codelens.md",
40+
"redirect_url": "https://learn.microsoft.com/visualstudio/azure/azure-app-insights-add-connected-service",
41+
"redirect_document_id": false
42+
},
3343
{
3444
"source_path_from_root": "/articles/azure-monitor/app/javascript-react-plugin.md",
3545
"redirect_url": "/azure/azure-monitor/app/javascript-framework-extensions",
@@ -201,6 +211,11 @@
201211
"redirect_url": "/troubleshoot/azure/azure-monitor/app-insights/troubleshoot-portal-connectivity",
202212
"redirect_document_id": false
203213
},
214+
{
215+
"source_path_from_root": "/articles/azure-monitor/app/javascript-sdk-load-failure.md",
216+
"redirect_url": "https://learn.microsoft.com/troubleshoot/azure/azure-monitor/app-insights/javascript-sdk-troubleshooting",
217+
"redirect_document_id": false
218+
},
204219
{
205220
"source_path_from_root": "/articles/azure-monitor/app/java-2x-troubleshoot.md",
206221
"redirect_url": "/troubleshoot/azure/azure-monitor/app-insights/java-2x-troubleshoot",

.openpublishing.redirection.json

Lines changed: 22046 additions & 21980 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/add-api-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ Content-type: application/json
146146
"displayName": "John Smith",
147147
"objectId": "11111111-0000-0000-0000-000000000000",
148148
"givenName":"John",
149-
"lastName":"Smith",
149+
"surname":"Smith",
150150
"step": "PostFederationSignup",
151151
"client_id":"<guid>",
152152
"ui_locales":"en-US"

articles/active-directory-b2c/app-registrations-training-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ In the legacy experience, apps were always created as customer-facing applicatio
5959
> [!NOTE]
6060
> This option is required to be able to run Azure AD B2C user flows to authenticate users for this application. Learn [how to register an application for use with user flows.](tutorial-register-applications.md)
6161
62-
You can also use this option to use Azure AD B2C as a SAML service provider. [Learn more](identity-provider-adfs.md).
62+
You can also use this option to use Azure AD B2C as a SAML service provider. [Learn more](saml-service-provider.md).
6363

6464
## Applications for DevOps scenarios
6565

articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -75,16 +75,16 @@ A job can go into quarantine regardless of failure counts for issues such as adm
7575

7676
The logic documented here may be different for certain connectors to ensure best customer experience, but we generally have the below retry cycles after a failure:
7777

78-
After the first failure, the first retry happens within the next 2 hours (usually in the next sync cycle).
79-
- The second retry happens 6 hours after the first failure.
80-
- The third retry happens 12 hours after the first failure.
81-
- The fourth retry happens 24 hours after the first failure.
82-
- The fifth retry happens 48 hours after the first failure.
83-
- The sixth retry happens 72 hours after the first failure.
84-
- The seventh retry happens 96 hours after the first failure.
85-
- The eighth retry happens 120 hours after the first failure.
86-
87-
This cycle is repeated every 24 hours until the 30th day when retries are stopped and the job is disabled.
78+
After the failure, the first retry will happen in 6 hours.
79+
- The second retry happens 12 hours after the first failure.
80+
- The third retry happens 24 hours after the first failure.
81+
- The fourth retry happens 48 hours after the first failure.
82+
- The fifth retry happens 96 hours after the first failure.
83+
- The sixth retry happens 192 hours after the first failure.
84+
- The seventh retry happens 384 hours after the first failure.
85+
- The eighth retry happens 768 hours after the first failure.
86+
87+
The retries are stopped after the 8th retry and the escrow entry is removed. The job will continue unless it hits the escrow thresholds from the section above
8888

8989

9090
## How do I get my application out of quarantine?

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 11/04/2022
11+
ms.date: 02/23/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -74,7 +74,7 @@ The following table lists an example of required attributes:
7474
|lastName|name.familyName|surName|
7575
|workMail|emails[type eq “work”].value|Mail|
7676
|manager|manager|manager|
77-
|tag|urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:tag|extensionAttribute1|
77+
|tag|`urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:tag`|extensionAttribute1|
7878
|status|active|isSoftDeleted (computed value not stored on user)|
7979

8080
The following JSON payload shows an example SCIM schema:
@@ -117,7 +117,7 @@ It helps to categorize between `/User` and `/Group` to map any default user attr
117117

118118
The following table lists an example of user attributes:
119119

120-
| Azure AD user | urn:ietf:params:scim:schemas:extension:enterprise:2.0:User |
120+
| Azure AD user | `urn:ietf:params:scim:schemas:extension:enterprise:2.0:User` |
121121
| --- | --- |
122122
| IsSoftDeleted |active |
123123
|department| `urn:ietf:params:scim:schemas:extension:enterprise:2.0:User:department`|
@@ -140,7 +140,7 @@ The following table lists an example of user attributes:
140140

141141
The following table lists an example of group attributes:
142142

143-
| Azure AD group | urn:ietf:params:scim:schemas:core:2.0:Group |
143+
| Azure AD group | `urn:ietf:params:scim:schemas:core:2.0:Group` |
144144
| --- | --- |
145145
| displayName |displayName |
146146
| members |members |
@@ -218,7 +218,7 @@ Use the general guidelines when implementing a SCIM endpoint to ensure compatibi
218218
### /Schemas (Schema discovery):
219219

220220
* [Sample request/response](#schema-discovery)
221-
* Schema discovery isn't currently supported on the custom non-gallery SCIM application, but it's being used on certain gallery applications. Going forward, schema discovery will be used as the sole method to add more attributes to the schema of an existing gallery SCIM application.
221+
* Schema discovery is being used on certain gallery applications. Schema discovery is the sole method to add more attributes to the schema of an existing gallery SCIM application. Schema discovery isn't currently supported on custom non-gallery SCIM application.
222222
* If a value isn't present, don't send null values.
223223
* Property values should be camel cased (for example, readWrite).
224224
* Must return a list response.
@@ -1373,8 +1373,8 @@ The SCIM spec doesn't define a SCIM-specific scheme for authentication and autho
13731373
|--|--|--|--|
13741374
|Username and password (not recommended or supported by Azure AD)|Easy to implement|Insecure - [Your Pa$$word doesn't matter](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/your-pa-word-doesn-t-matter/ba-p/731984)|Not supported for new gallery or non-gallery apps.|
13751375
|Long-lived bearer token|Long-lived tokens don't require a user to be present. They're easy for admins to use when setting up provisioning.|Long-lived tokens can be hard to share with an admin without using insecure methods such as email. |Supported for gallery and non-gallery apps. |
1376-
|OAuth authorization code grant|Access tokens are much shorter-lived than passwords, and have an automated refresh mechanism that long-lived bearer tokens don't have. A real user must be present during initial authorization, adding a level of accountability. |Requires a user to be present. If the user leaves the organization, the token is invalid, and authorization will need to be completed again.|Supported for gallery apps, but not non-gallery apps. However, you can provide an access token in the UI as the secret token for short term testing purposes. Support for OAuth code grant on non-gallery is in our backlog, in addition to support for configurable auth / token URLs on the gallery app.|
1377-
|OAuth client credentials grant|Access tokens are much shorter-lived than passwords, and have an automated refresh mechanism that long-lived bearer tokens don't have. Both the authorization code grant and the client credentials grant create the same type of access token, so moving between these methods is transparent to the API. Provisioning can be automated, and new tokens can be silently requested without user interaction. ||Supported for gallery apps, but not non-gallery apps. However, you can provide an access token in the UI as the secret token for short term testing purposes. Support for OAuth client credentials grant on non-gallery is in our backlog.|
1376+
|OAuth authorization code grant|Access tokens have a shorter life than passwords, and have an automated refresh mechanism that long-lived bearer tokens don't have. A real user must be present during initial authorization, adding a level of accountability. |Requires a user to be present. If the user leaves the organization, the token is invalid, and authorization will need to be completed again.|Supported for gallery apps, but not non-gallery apps. However, you can provide an access token in the UI as the secret token for short term testing purposes. Support for OAuth code grant on non-gallery is in our backlog, in addition to support for configurable auth / token URLs on the gallery app.|
1377+
|OAuth client credentials grant|Access tokens have a shorter life than passwords, and have an automated refresh mechanism that long-lived bearer tokens don't have. Both the authorization code grant and the client credentials grant create the same type of access token, so moving between these methods is transparent to the API. Provisioning can be automated, and new tokens can be silently requested without user interaction. ||Supported for gallery apps, but not non-gallery apps. However, you can provide an access token in the UI as the secret token for short term testing purposes. Support for OAuth client credentials grant on non-gallery is in our backlog.|
13781378

13791379
> [!NOTE]
13801380
> It's not recommended to leave the token field blank in the Azure AD provisioning configuration custom app UI. The token generated is primarily available for testing purposes.

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ metadata:
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: faq
10-
ms.date: 10/05/2022
10+
ms.date: 02/21/2023
1111
ms.author: justinha
12-
author: vimrang
12+
author: justinha
1313
manager: amycolannino
1414
ms.reviewer: vimrang
1515
ms.collection: M365-identity-device-management
@@ -69,7 +69,7 @@ sections:
6969
7070
Use the [Set-AzureADTrustedCertificateAuthority](/powershell/module/azuread/set-azureadtrustedcertificateauthority) cmdlet:
7171
72-
```powershell
72+
```PowerShell
7373
$c=Get-AzureADTrustedCertificateAuthority
7474
$c[0]. crlDistributionPoint=""
7575
Set-AzureADTrustedCertificateAuthority -CertificateAuthorityInformation $c[0]
@@ -120,14 +120,14 @@ sections:
120120
The browser caches the certificate after the certificate picker appears. If the user retries, the cached certificate is used automatically. The user should close the browser, and reopen a new session to try CBA again.
121121
122122
- question: |
123-
Why does not proof up for registering other auth methods come up when I use single factor certificates?
123+
Why doesn't proof up for registering other auth methods come up when I use single factor certificates?
124124
answer: |
125-
A user will be considered MFA capable when a user is in scope for Certificate-based authentication auth method. This means user will not be able to use proof up as part of their authentication to registerd other available methods and should have MFA via another method to register other available auth methods.
125+
A user is considered capable for MFA when the user is in scope for **Certificate-based authentication** in the Authentication methods policy. This policy requirement means a user can't use proof up as part of their authentication to register other available methods.
126126
127127
- question: |
128128
How can I use single-factor certificates to complete MFA?
129129
answer: |
130-
We have support for single factor CBA to get MFA. CBA SF + PSI (passwordless phone sign in) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
130+
We have support for single factor CBA to get MFA. CBA SF + passwordless phone sign-in (PSI) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
131131
[MFA with single factor certificates](../authentication/concept-certificate-based-authentication-technical-deep-dive.md#mfa-authentication-flow-using-single-factor-certificates-and-passwordless-sign-in)
132132
133133
- question: |
@@ -146,7 +146,16 @@ sections:
146146
GET https://graph.microsoft.com/v1.0/users?$filter=certificateUserIds/any(x:x eq '[email protected]')
147147
```
148148
149-
149+
- question: |
150+
After a CRL endpoint is configured, end users aren't able to sign in and they see the following diagnostic message:
151+
152+
```http
153+
AADSTS500173: Unable to download CRL. Invalid status code Forbidden from CRL distribution point
154+
errorCode: 500173
155+
```
156+
157+
answer: |
158+
This is commonly seen when a firewall rule setting blocks access to the CRL endpoint.
150159
151160
additionalContent: |
152161
## Next steps

articles/active-directory/cloud-infrastructure-entitlement-management/partner-list.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Microsoft verified partners can help you onboard Microsoft Entra Permissions Man
3131
* **Onboarding and Deployment Support**
3232

3333
Partners can guide you through the entire onboarding and deployment process for
34-
ermissions Management across AWS, Azure, and GCP.
34+
Permissions Management across AWS, Azure, and GCP.
3535

3636

3737
## Partner list

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,6 @@ There are multiple scenarios that organizations can now enable using filter for
3737

3838
Filter for devices is an option when creating a Conditional Access policy in the Azure portal or using the Microsoft Graph API.
3939

40-
> [!IMPORTANT]
41-
> Device state and filter for devices cannot be used together in Conditional Access policy.
42-
4340
The following steps will help create two Conditional Access policies to support the first scenario under [Common scenarios](#common-scenarios).
4441

4542
Policy 1: All users with the directory role of Global Administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,6 @@ To apply this grant control, the device must be registered in Azure AD, which re
9494
The following client apps support this setting, this list isn't exhaustive and is subject to change::
9595

9696
- Microsoft Azure Information Protection
97-
- Microsoft Bookings
9897
- Microsoft Cortana
9998
- Microsoft Dynamics 365
10099
- Microsoft Edge
@@ -114,7 +113,6 @@ The following client apps support this setting, this list isn't exhaustive and i
114113
- Microsoft PowerPoint
115114
- Microsoft SharePoint
116115
- Microsoft Skype for Business
117-
- Microsoft StaffHub
118116
- Microsoft Stream
119117
- Microsoft Teams
120118
- Microsoft To-Do
@@ -194,7 +192,7 @@ When user risk is detected, administrators can employ the user risk policy condi
194192
When a user is prompted to change a password, they'll first be required to complete multifactor authentication. Make sure all users have registered for multifactor authentication, so they're prepared in case risk is detected for their account.
195193

196194
> [!WARNING]
197-
> Users must have previously registered for self-service password reset before triggering the user risk policy.
195+
> Users must have previously registered for multifactor authentication before triggering the user risk policy.
198196
199197
The following restrictions apply when you configure a policy by using the password change control:
200198

0 commit comments

Comments
 (0)