Skip to content

Commit efc39f4

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into gdpStorSimpleFix
2 parents 08cec1a + beb3b7f commit efc39f4

File tree

190 files changed

+2740
-2207
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

190 files changed

+2740
-2207
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -450,6 +450,16 @@
450450
"redirect_url": "https://docs.microsoft.com/previous-versions/azure/batch-ai/overview-what-happened-batch-ai",
451451
"redirect_document_id": true
452452
},
453+
{
454+
"source_path": "articles/azure-arc/servers/quickstart-onboard-portal.md",
455+
"redirect_url": "/azure/azure-arc/servers/onboard-portal",
456+
"redirect_document_id": false
457+
},
458+
{
459+
"source_path": "articles/azure-arc/servers/quickstart-onboard-powershell.md",
460+
"redirect_url": "/azure/azure-arc/servers/onboard-service-principal",
461+
"redirect_document_id": false
462+
},
453463
{
454464
"source_path": "articles/batch-ai/quickstart-create-cluster-cli.md",
455465
"redirect_url": "https://docs.microsoft.com/previous-versions/azure/batch-ai/quickstart-create-cluster-cli",
@@ -35410,6 +35420,16 @@
3541035420
"redirect_url": "/azure/iot-accelerators/iot-accelerators-device-simulation-advanced-device",
3541135421
"redirect_document_id": false
3541235422
},
35423+
{
35424+
"source_path": "articles/active-directory/conditional-access/technical-reference.md",
35425+
"redirect_url": "/azure/active-directory/conditional-access/concept-conditional-access-conditions",
35426+
"redirect_document_id": false
35427+
},
35428+
{
35429+
"source_path": "articles/active-directory/conditional-access/conditions.md",
35430+
"redirect_url": "/azure/active-directory/conditional-access/concept-conditional-access-conditions",
35431+
"redirect_document_id": true
35432+
},
3541335433
{
3541435434
"source_path": "articles/active-directory/develop/active-directory-v2-devquickstarts-angular-dotnet.md",
3541535435
"redirect_url": "/azure/active-directory/develop/GuidedSetups/active-directory-javascriptspa",

articles/active-directory/conditional-access/TOC.yml

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -19,20 +19,30 @@
1919
href: concept-conditional-access-policy-common.md
2020
- name: Conditional Access policy components
2121
href: concept-conditional-access-policies.md
22-
- name: Cloud apps and actions
23-
href: concept-conditional-access-cloud-apps.md
24-
- name: Conditions
25-
href: conditions.md
26-
- name: Location conditions
27-
href: location-condition.md
28-
- name: Controls
29-
href: controls.md
22+
- name: Assignments
23+
items:
24+
- name: Users and groups
25+
href: concept-conditional-access-users-groups.md
26+
- name: Cloud apps or actions
27+
href: concept-conditional-access-cloud-apps.md
28+
- name: Conditions
29+
href: concept-conditional-access-conditions.md
30+
- name: Access controls
31+
items:
32+
- name: Grant
33+
href: concept-conditional-access-grant.md
34+
- name: Session
35+
href: concept-conditional-access-session.md
3036
- name: Report-only mode
3137
href: concept-conditional-access-report-only.md
3238
- name: Service dependencies
3339
href: service-dependencies.md
40+
- name: Location conditions
41+
href: location-condition.md
3442
- name: What if tool
3543
href: what-if-tool.md
44+
- name: Controls
45+
href: controls.md
3646
- name: Classic policy migrations
3747
href: policy-migration.md
3848
- name: Baseline protection policies
@@ -84,10 +94,6 @@
8494
items:
8595
- name: Troubleshoot using the What If tool
8696
href: troubleshoot-conditional-access-what-if.md
87-
- name: Reference
88-
items:
89-
- name: Technical reference
90-
href: technical-reference.md
9197
- name: Resources
9298
items:
9399
- name: Azure feedback forum

articles/active-directory/conditional-access/app-based-conditional-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,15 +35,15 @@ In the Conditional Access terminology, these client apps are known as **approved
3535

3636
![Conditional Access](./media/app-based-conditional-access/05.png)
3737

38-
For a list of approved client apps, see [approved client app requirement](technical-reference.md#approved-client-app-requirement).
38+
For a list of approved client apps, see [approved client app requirement](concept-conditional-access-grant.md).
3939

4040
You can combine app-based Conditional Access policies with other policies such as [device-based Conditional Access policies](require-managed-devices.md) to provide flexibility in how to protect data for both personal and corporate devices.
4141

4242
## Before you begin
4343

4444
This topic assumes that you are familiar with:
4545

46-
- The [approved client app requirement](technical-reference.md#approved-client-app-requirement) technical reference.
46+
- The [approved client app requirement](concept-conditional-access-grant.md).
4747
- The basic concepts of [Conditional Access in Azure Active Directory](overview.md).
4848
- How to [configure a Conditional Access policy](app-based-mfa.md).
4949
- The [migration of Conditional Access policies](best-practices.md#policy-migration).

articles/active-directory/conditional-access/app-protection-based-conditional-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In the Conditional Access terminology, these client apps are known to be policy
3535

3636
![Conditional Access](./media/app-protection-based-conditional-access/05.png)
3737

38-
For a list of policy-protected client apps, see [App protection policy requirement](technical-reference.md#approved-client-app-requirement).
38+
For a list of policy-protected client apps, see [App protection policy requirement](concept-conditional-access-grant.md).
3939

4040
You can combine app-protection-based Conditional Access policies with other policies, such as [device-based Conditional Access policies](require-managed-devices.md). This way, you can provide flexibility in how to protect data for both personal and corporate devices.
4141

@@ -54,8 +54,8 @@ Similar to compliance that's reported by Intune for iOS and Android for a manage
5454

5555
This article assumes that you're familiar with:
5656

57-
- The [app protection policy requirement](technical-reference.md#app-protection-policy-requirement) technical reference.
58-
- The [approved client app requirement](technical-reference.md#approved-client-app-requirement) technical reference.
57+
- The [app protection policy requirement](concept-conditional-access-grant.md).
58+
- The [approved client app requirement](concept-conditional-access-grant.md).
5959
- The basic concepts of [Conditional Access in Azure Active Directory](overview.md).
6060
- How to [configure a Conditional Access policy](app-based-mfa.md).
6161

articles/active-directory/conditional-access/app-sign-in-risk.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection: M365-identity-device-management
1818
---
1919
# Quickstart: Block access when a session risk is detected with Azure Active Directory Conditional Access
2020

21-
To keep your environment protected, you might want to block suspicious users from sign-in. [Azure Active Directory (Azure AD) Identity Protection](../active-directory-identityprotection.md) analyzes each sign-in and calculates the likelihood that a sign-in attempt was not performed by the legitimate owner of a user account. The likelihood (low, medium, high) is indicated in form of a calculated value called [sign-in risk levels](conditions.md#sign-in-risk). By setting the sign-in risk condition, you can configure a Conditional Access policy to respond to specific sign-in risk levels.
21+
To keep your environment protected, you might want to block suspicious users from sign-in. [Azure Active Directory (Azure AD) Identity Protection](../active-directory-identityprotection.md) analyzes each sign-in and calculates the likelihood that a sign-in attempt was not performed by the legitimate owner of a user account. The likelihood (low, medium, high) is indicated in form of a calculated value called [sign-in risk levels](concept-conditional-access-conditions.md#sign-in-risk). By setting the sign-in risk condition, you can configure a Conditional Access policy to respond to specific sign-in risk levels.
2222

2323
This quickstart shows how to configure a [Conditional Access policy](../active-directory-conditional-access-azure-portal.md) that blocks a sign-in when a configured sign-in risk level has been detected.
2424

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Client apps in Conditional Access policy - Azure Active Directory
3-
description:
2+
title: Cloud apps or actions in Conditional Access policy - Azure Active Directory
3+
description: What are cloud apps or actions in an Azure AD Conditional Access policy
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 01/10/2020
9+
ms.date: 02/11/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -15,14 +15,14 @@ ms.reviewer: calebb
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Conditional Access: Cloud apps and actions
18+
# Conditional Access: Cloud apps or actions
1919

20-
Cloud apps or actions is a key part of a Conditional Access policy. Conditional Access policies allow administrators to assign controls to specific applications or actions.
20+
Cloud apps or actions are a key signal in a Conditional Access policy. Conditional Access policies allow administrators to assign controls to specific applications or actions.
2121

2222
- Administrators can choose from the list of applications that include built-in Microsoft applications and any [Azure AD integrated applications](../manage-apps/what-is-application-management.md) including gallery, non-gallery, and applications published through [Application Proxy](../manage-apps/what-is-application-proxy.md).
2323
- Administrators may choose to define policy not based on a cloud application but on a user action. The only supported action is Register security information (preview), allowing Conditional Access to enforce controls around the [combined security information registration experience](../authentication/howto-registration-mfa-sspr-combined.md).
2424

25-
![Define a Conditional Access policy and specify cloud apps](./media/concept-conditional-access-cloud-apps/conditional-access-define-policy-specify-cloud-apps.png)
25+
![Define a Conditional Access policy and specify cloud apps](./media/concept-conditional-access-cloud-apps/conditional-access-cloud-apps-or-actions.png)
2626

2727
## Microsoft cloud applications
2828

@@ -121,6 +121,7 @@ User actions are tasks that can be performed by a user. The only currently suppo
121121

122122
## Next steps
123123

124-
- [Conditional Access policy components](concept-conditional-access-policies.md)
124+
- [Conditional Access: Conditions](concept-conditional-access-conditions.md)
125+
126+
- [Conditional Access common policies](concept-conditional-access-policy-common.md)
125127
- [Client application dependencies](service-dependencies.md)
126-
- [Microsoft Intune: Require MFA for device enrollment](https://docs.microsoft.com/intune/enrollment/multi-factor-authentication)

0 commit comments

Comments
 (0)