Skip to content

Commit f355dac

Browse files
2 parents 0e6b835 + fe9f77b commit f355dac

File tree

328 files changed

+3133
-2167
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

328 files changed

+3133
-2167
lines changed

.openpublishing.publish.config.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -377,6 +377,11 @@
377377
"url": "https://github.com/microsoft/immersive-reader-sdk",
378378
"branch": "master",
379379
"branch_mapping": {}
380+
},
381+
{
382+
"path_to_root": "azure-cosmosdb-java-v2",
383+
"url": "https://github.com/Azure/azure-cosmosdb-java",
384+
"branch": "master"
380385
}
381386
],
382387
"branch_target_mapping": {

articles/active-directory-b2c/predicates.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 09/10/2018
11+
ms.date: 10/28/2019
1212
ms.author: marsma
1313
ms.subservice: B2C
1414
---
@@ -27,6 +27,8 @@ The following diagram shows the relationship between the elements:
2727

2828
The **Predicate** element defines a basic validation to check the value of a claim type and returns `true` or `false`. The validation is done by using a specified **Method** element and a set of **Parameter** elements relevant to the method. For example, a predicate can check whether the length of a string claim value is within the range of minimum and maximum parameters specified, or whether a string claim value contains a character set. The **UserHelpText** element provides an error message for users if the check fails. The value of **UserHelpText** element can be localized using [language customization](localization.md).
2929

30+
The **Predicates** element must appear directly following the **ClaimsSchema** element within the [BuildingBlocks](buildingblocks.md) element.
31+
3032
The **Predicates** element contains the following element:
3133

3234
| Element | Occurrences | Description |
@@ -108,6 +110,8 @@ The following example shows a `IsDateRange` method with the parameters `Minimum`
108110

109111
While the predicates define the validation to check against a claim type, the **PredicateValidations** group a set of predicates to form a user input validation that can be applied to a claim type. Each **PredicateValidation** element contains a set of **PredicateGroup** elements that contain a set of **PredicateReference** elements that points to a **Predicate**. To pass the validation, the value of the claim should pass all of the tests of any predicate under all of the **PredicateGroup** with their set of **PredicateReference** elements.
110112

113+
The **PredicateValidations** element must appear directly following the **Predicates** element within the [BuildingBlocks](buildingblocks.md) element.
114+
111115
```XML
112116
<PredicateValidations>
113117
<PredicateValidation Id="">
@@ -190,7 +194,7 @@ With **Predicates** and **PredicateValidationsInput** you can control the comple
190194
- **Lowercase** using the `IncludesCharacters` method, validates that the password contains a lowercase letter.
191195
- **Uppercase** using the `IncludesCharacters` method, validates that the password contains an uppercase letter.
192196
- **Number** using the `IncludesCharacters` method, validates that the password contains a digit.
193-
- **Symbol** using the `IncludesCharacters` method, validates that the password contains one of following symbols `@#$%^&*\-_+=[]{}|\:',?/~"();!`
197+
- **Symbol** using the `IncludesCharacters` method, validates that the password contains one of several symbol characters.
194198
- **PIN** using the `MatchesRegex` method, validates that the password contains numbers only.
195199
- **AllowedAADCharacters** using the `MatchesRegex` method, validates that the password only invalid character was provided.
196200
- **DisallowedWhitespace** using the `MatchesRegex` method, validates that the password doesn't begin or end with a whitespace character.
@@ -229,7 +233,7 @@ With **Predicates** and **PredicateValidationsInput** you can control the comple
229233
<Predicate Id="Symbol" Method="IncludesCharacters">
230234
<UserHelpText>a symbol</UserHelpText>
231235
<Parameters>
232-
<Parameter Id="CharacterSet">@#$%^&amp;*\-_+=[]{}|\:',?/`~"();!</Parameter>
236+
<Parameter Id="CharacterSet">@#$%^&amp;*\-_+=[]{}|\\:',.?/`~"();!</Parameter>
233237
</Parameters>
234238
</Predicate>
235239

articles/active-directory-domain-services/compare-identity-solutions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ On an Azure AD-joined or registered device, user authentication happens using mo
9494
| Representation in the directory | Device objects in the Azure AD directory | Computer objects in the Azure AD DS managed domain |
9595
| Authentication | OAuth / OpenID Connect based protocols | Kerberos and NTLM protocols |
9696
| Management | Mobile Device Management (MDM) software like Intune | Group Policy |
97-
| Networking | Works over the internet | Requires machines to be on the same virtual network as the managed domain |
97+
| Networking | Works over the internet | Must be connected to, or peered with, the virtual network where the managed domain is deployed |
9898
| Great for... | End-user mobile or desktop devices | Server VMs deployed in Azure |
9999

100100
## Next steps
@@ -107,4 +107,4 @@ To get started with using Azure AD DS, [create an Azure AD DS managed domain usi
107107
[custom-ou]: create-ou.md
108108
[manage-gpos]: manage-group-policy.md
109109
[tutorial-ldaps]: tutorial-configure-ldaps.md
110-
[tutorial-create]: tutorial-create-instance.md
110+
[tutorial-create]: tutorial-create-instance.md

articles/active-directory-domain-services/tutorial-configure-networking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ To see this managed domain in action, create and join a virtual machine to the d
151151
> [!div class="nextstepaction"]
152152
> [Join a Windows Server virtual machine to your managed domain](join-windows-vm.md)
153153
154-
<!-- INTERNAL LINKS -->
154+
<!-- INTERNAL LINKS -->
155155
[create-azure-ad-tenant]: ../active-directory/fundamentals/sign-up-organization.md
156156
[associate-azure-ad-tenant]: ../active-directory/fundamentals/active-directory-how-subscriptions-associated-directory.md
157157
[create-azure-ad-ds-instance]: tutorial-create-instance.md

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/03/2019
9+
ms.date: 10/28/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -112,6 +112,8 @@ Configure email addresses here for users who will receive fraud alert emails.
112112
>[!NOTE]
113113
>When Multi-Factor Authentication calls are placed through the public telephone network, sometimes they are routed through a carrier that doesn't support caller ID. Because of this, caller ID is not guaranteed, even though the Multi-Factor Authentication system always sends it.
114114
115+
In the United States, if you haven't configured MFA Caller ID, voice calls from Microsoft come from the following numbers: +1 (866) 539 4191, +1 (855) 330 8653, and +1 (877) 668 6536. If using spam filters, make sure to exclude these numbers.
116+
115117
### Custom voice messages
116118

117119
You can use your own recordings or greetings for two-step verification with the _custom voice messages_ feature. These messages can be used in addition to or to replace the Microsoft recordings.
@@ -384,7 +386,7 @@ Additional details about the use of authentication methods can be found in the a
384386
The _remember Multi-Factor Authentication_ feature for devices and browsers that are trusted by the user is a free feature for all Multi-Factor Authentication users. Users can bypass subsequent verifications for a specified number of days, after they've successfully signed-in to a device by using Multi-Factor Authentication. The feature enhances usability by minimizing the number of times a user has to perform two-step verification on the same device.
385387

386388
>[!IMPORTANT]
387-
>If an account or device is compromised, remembering Multi-Factor Authentication for trusted devices can affect security. If a corporate account becomes compromised or a trusted device is lost or stolen, you should [restore Multi-Factor Authentication on all devices](howto-mfa-userdevicesettings.md#restore-mfa-on-all-remembered-devices-for-a-user).
389+
>If an account or device is compromised, remembering Multi-Factor Authentication for trusted devices can affect security. If a corporate account becomes compromised or a trusted device is lost or stolen, you should [Revoke MFA Sessions](howto-mfa-userdevicesettings.md).
388390
>
389391
>The restore action revokes the trusted status from all devices, and the user is required to perform two-step verification again. You can also instruct your users to restore Multi-Factor Authentication on their own devices with the instructions in [Manage your settings for two-step verification](../user-help/multi-factor-authentication-end-user-manage-settings.md#turn-on-two-factor-verification-prompts-on-a-trusted-device).
390392

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ If you need to kick off a new round of synchronization, us the instructions in [
116116
There are two factors that affect which authentication methods are available with an NPS extension deployment:
117117

118118
1. The password encryption algorithm used between the RADIUS client (VPN, Netscaler server, or other) and the NPS servers.
119-
- **PAP** supports all the authentication methods of Azure MFA in the cloud: phone call, one-way text message, mobile app notification, and mobile app verification code.
119+
- **PAP** supports all the authentication methods of Azure MFA in the cloud: phone call, one-way text message, mobile app notification, OATH hardware tokens, and mobile app verification code.
120120
- **CHAPV2** and **EAP** support phone call and mobile app notification.
121121

122122
> [!NOTE]

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 2 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 08/29/2019
9+
ms.date: 10/28/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -36,33 +36,9 @@ As an administrator assigned the Authentication Administrator role you can requi
3636
- **Require Re-register MFA** will make it so that when the user signs in next time, they will be requested to setup a new MFA authentication method.
3737
- **Revoke MFA Sessions** clears the user's remembered MFA sessions and requires them to perform MFA the next time it is required by the policy on the device.
3838

39-
## Require users to provide contact methods again
40-
41-
This setting forces the user to complete the registration process again. Non-browser apps continue to work if the user has app passwords for them. You can delete the users app passwords by also selecting **Delete all existing app passwords generated by the selected users**.
42-
43-
### How to require users to provide contact methods again
44-
45-
1. Sign in to the [Azure portal](https://portal.azure.com).
46-
2. On the left, select **Azure Active Directory** > **Users** > **All users**.
47-
3. On the right, select **Multi-Factor Authentication** on the toolbar. The multi-factor authentication page opens.
48-
4. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
49-
5. Select **Manage user settings**.
50-
6. Check the box for **Require selected users to provide contact methods again**.
51-
![Require users to provide contact methods again](./media/howto-mfa-userdevicesettings/reproofup.png)
52-
7. Click **save**.
53-
8. Click **close**.
54-
55-
Organizations can complete these steps with PowerShell using the following as a guide to clear the `StrongAuthenticationMethods` attribute:
56-
57-
```PowerShell
58-
59-
$noMfaConfig = @()
60-
Set-MsolUser -UserPrincipalName $Upn -StrongAuthenticationMethods $noMfaConfig
61-
```
62-
6339
## Delete users existing app passwords
6440

65-
This setting deletes all of the app passwords that a user has created. Non-browser apps that were associated with these app passwords stop working until a new app password is created.
41+
This setting deletes all of the app passwords that a user has created. Non-browser apps that were associated with these app passwords stop working until a new app password is created. Global administrator permissions are required to perform this action.
6642

6743
### How to delete users existing app passwords
6844

@@ -76,26 +52,6 @@ This setting deletes all of the app passwords that a user has created. Non-brows
7652
7. Click **save**.
7753
8. Click **close**.
7854

79-
## Restore MFA on all remembered devices for a user
80-
81-
One of the configurable features of Azure Multi-Factor Authentication is giving your users the option to mark devices as trusted. For more information, see [Configure Azure Multi-Factor Authentication settings](howto-mfa-mfasettings.md#remember-multi-factor-authentication).
82-
83-
Users can opt out of two-step verification for a configurable number of days on their regular devices. If an account is compromised or a trusted device is lost, you need to be able to remove the trusted status and require two-step verification again.
84-
85-
When checked, **Restore multi-factor authentication on all remembered devices** users are required to perform two-step verification the next time they sign in, even if they marked their device as trusted.
86-
87-
### How to restore MFA on all suspended devices for a user
88-
89-
1. Sign in to the [Azure portal](https://portal.azure.com).
90-
2. On the left, select **Azure Active Directory** > **Users** > **All users**.
91-
3. On the right, select **Multi-Factor Authentication** on the toolbar. The multi-factor authentication page opens.
92-
4. Check the box next to the user or users that you wish to manage. A list of quick step options appears on the right.
93-
5. Select **Manage user settings**.
94-
6. Check the box for **Restore multi-factor authentication on all remembered devices**
95-
![Restore multi-factor authentication on all remembered devices](./media/howto-mfa-userdevicesettings/rememberdevices.png)
96-
7. Click **save**.
97-
8. Click **close**.
98-
9955
## Next steps
10056

10157
- Get more information about how to [Configure Azure Multi-Factor Authentication settings](howto-mfa-mfasettings.md)

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 07/17/2019
9+
ms.date: 10/28/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -35,7 +35,6 @@ For machines running Windows 7, 8, 8.1, and 10 you can enable users to reset the
3535
## General limitations
3636

3737
- Password reset is not currently supported from a Remote Desktop or from Hyper-V enhanced sessions.
38-
- Account unlock, mobile app notification, and mobile app code are not supported.
3938
- This feature does not work for networks with 802.1x network authentication deployed and the option “Perform immediately before user logon”. For networks with 802.1x network authentication deployed it is recommended to use machine authentication to enable this feature.
4039

4140
## Windows 10 password reset

0 commit comments

Comments
 (0)