Skip to content

Commit f39e322

Browse files
authored
Merge branch 'main' into alexbuckgit/docutune-autopr-20230918-141307-7479199-ignore-build
2 parents 5f41f8b + 8a186c0 commit f39e322

File tree

3,738 files changed

+56346
-47910
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,738 files changed

+56346
-47910
lines changed

.openpublishing.publish.config.json

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -974,12 +974,90 @@
974974
"branch": "main",
975975
"branch_mapping": {}
976976
},
977+
{
978+
"path_to_root": "cosmos-db-nosql-javascript-samples",
979+
"url": "https://github.com/azure-samples/cosmos-db-nosql-javascript-samples",
980+
"branch": "main",
981+
"branch_mapping": {}
982+
},
977983
{
978984
"path_to_root": "cosmos-db-nosql-python-samples",
979985
"url": "https://github.com/azure-samples/cosmos-db-nosql-python-samples",
980986
"branch": "main",
981987
"branch_mapping": {}
982988
},
989+
{
990+
"path_to_root": "cosmos-db-mongodb-dotnet-samples",
991+
"url": "https://github.com/azure-samples/cosmos-db-mongodb-dotnet-samples",
992+
"branch": "main",
993+
"branch_mapping": {}
994+
},
995+
{
996+
"path_to_root": "cosmos-db-mongodb-javascript-samples",
997+
"url": "https://github.com/azure-samples/cosmos-db-mongodb-javascript-samples",
998+
"branch": "main",
999+
"branch_mapping": {}
1000+
},
1001+
{
1002+
"path_to_root": "cosmos-db-mongodb-python-samples",
1003+
"url": "https://github.com/azure-samples/cosmos-db-mongodb-python-samples",
1004+
"branch": "main",
1005+
"branch_mapping": {}
1006+
},
1007+
{
1008+
"path_to_root": "cosmos-db-apache-cassandra-dotnet-samples",
1009+
"url": "https://github.com/azure-samples/cosmos-db-apache-cassandra-dotnet-samples",
1010+
"branch": "main",
1011+
"branch_mapping": {}
1012+
},
1013+
{
1014+
"path_to_root": "cosmos-db-apache-cassandra-javascript-samples",
1015+
"url": "https://github.com/azure-samples/cosmos-db-apache-cassandra-javascript-samples",
1016+
"branch": "main",
1017+
"branch_mapping": {}
1018+
},
1019+
{
1020+
"path_to_root": "cosmos-db-apache-cassandra-python-samples",
1021+
"url": "https://github.com/azure-samples/cosmos-db-apache-cassandra-python-samples",
1022+
"branch": "main",
1023+
"branch_mapping": {}
1024+
},
1025+
{
1026+
"path_to_root": "cosmos-db-apache-gremlin-dotnet-samples",
1027+
"url": "https://github.com/azure-samples/cosmos-db-apache-gremlin-dotnet-samples",
1028+
"branch": "main",
1029+
"branch_mapping": {}
1030+
},
1031+
{
1032+
"path_to_root": "cosmos-db-apache-gremlin-javascript-samples",
1033+
"url": "https://github.com/azure-samples/cosmos-db-apache-gremlin-javascript-samples",
1034+
"branch": "main",
1035+
"branch_mapping": {}
1036+
},
1037+
{
1038+
"path_to_root": "cosmos-db-apache-gremlin-python-samples",
1039+
"url": "https://github.com/azure-samples/cosmos-db-apache-gremlin-python-samples",
1040+
"branch": "main",
1041+
"branch_mapping": {}
1042+
},
1043+
{
1044+
"path_to_root": "cosmos-db-table-dotnet-samples",
1045+
"url": "https://github.com/azure-samples/cosmos-db-table-dotnet-samples",
1046+
"branch": "main",
1047+
"branch_mapping": {}
1048+
},
1049+
{
1050+
"path_to_root": "cosmos-db-table-javascript-samples",
1051+
"url": "https://github.com/azure-samples/cosmos-db-table-javascript-samples",
1052+
"branch": "main",
1053+
"branch_mapping": {}
1054+
},
1055+
{
1056+
"path_to_root": "cosmos-db-table-python-samples",
1057+
"url": "https://github.com/azure-samples/cosmos-db-table-python-samples",
1058+
"branch": "main",
1059+
"branch_mapping": {}
1060+
},
9831061
{
9841062
"path_to_root": "azure-cosmos-db-table-dotnet-v12",
9851063
"url": "https://github.com/Azure-Samples/cosmos-db-table-api-dotnet-samples",

.openpublishing.redirection.azure-kubernetes-service.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,11 @@
1919
"source_path_from_root": "/articles/aks/aks-planned-maintenance-weekly-releases.md",
2020
"redirect_url": "/azure/aks/planned-maintenance",
2121
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/aks/create-k8s-cluster-with-aks-application-gateway-ingress.md",
25+
"redirect_url": "/azure/application-gateway/for-containers/overview",
26+
"redirect_document_id": false
2227
}
2328
]
2429
}

.openpublishing.redirection.json

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22362,6 +22362,11 @@
2236222362
"redirect_url": "/azure/communication-services/how-tos/calling-sdk/lobby",
2236322363
"redirect_document_id": false
2236422364
},
22365+
{
22366+
"source_path_from_root": "/articles/communication-services/tutorials/widgets/click-to-call-widget.md",
22367+
"redirect_url": "/azure/communication-services/tutorials/calling-widget/calling-widget-overview",
22368+
"redirect_document_id": false
22369+
},
2236522370
{
2236622371
"source_path_from_root": "/articles/load-balancer/tutorial-load-balancer-standard-manage-portal.md",
2236722372
"redirect_url": "/azure/load-balancer/quickstart-load-balancer-standard-public-portal",
@@ -23591,13 +23596,27 @@
2359123596
"source_path_from_root": "/articles/devtest-labs/how-to-move-schedule-to-new-region.md",
2359223597
"redirect_url": "/azure/devtest-labs/how-to-move-labs",
2359323598
"redirect_document_id": false
23594-
},
23599+
},
2359523600
{
2359623601
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-prescriptive-adoption.md",
2359723602
"redirect_url": "/azure/devtest-labs/deliver-proof-of-concept",
2359823603
"redirect_document_id": false
2359923604
},
2360023605
{
23606+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-governance-cost-ownership.md",
23607+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-governance-resources",
23608+
"redirect_document_id": false
23609+
},
23610+
{
23611+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-governance-policy-compliance.md",
23612+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-governance-resources",
23613+
"redirect_document_id": false
23614+
},
23615+
{
23616+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-guidance-governance-application-migration-integration.md",
23617+
"redirect_url": "/azure/devtest-labs/devtest-lab-guidance-governance-resources",
23618+
"redirect_document_id": false
23619+
}, {
2360123620
"source_path_from_root": "/articles/azure/virtual-desktop/azure-advisor.md",
2360223621
"redirect_url": "/azure/advisor/advisor-overview",
2360323622
"redirect_document_id": false
@@ -24496,6 +24515,14 @@
2449624515
"source_path_from_root": "/articles/aks/command-invoke.md",
2449724516
"redirect_url": "/azure/aks/access-private-cluster",
2449824517
"redirect_document_id": false
24518+
},
24519+
{
24520+
"source_path_from_root": "/articles/orbital/space-partner-program-overview.md",
24521+
"redirect_url": "/azure/orbital/overview",
24522+
"redirect_document_id": false
2449924523
}
24524+
24525+
24526+
2450024527
]
2450124528
}

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 09/15/2023
4+
ms.date: 09/19/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/provision-on-demand.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -173,6 +173,7 @@ There are currently a few known limitations to on-demand provisioning. Post your
173173
* On-demand provisioning of roles isn't supported.
174174
* On-demand provisioning supports disabling users that have been unassigned from the application. However, it doesn't support disabling or deleting users that have been disabled or deleted from Azure AD. Those users don't appear when you search for a user.
175175
* On-demand provisioning doesn't support nested groups that aren't directly assigned to the application.
176+
* The on-demand provisioning request API can only accept a single group with up to 5 members at a time.
176177

177178
## Next steps
178179

articles/active-directory/authentication/TOC.yml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
items:
1010
- name: Enable self-service password reset
1111
href: tutorial-enable-sspr.md
12-
- name: Enable Azure AD Multi-Factor Authentication
12+
- name: Enable Microsoft Entra multifactor authentication
1313
href: tutorial-enable-azure-mfa.md
1414
- name: Enable cloud sync password writeback
1515
href: tutorial-enable-cloud-sync-sspr-writeback.md
@@ -54,7 +54,7 @@
5454
href: concept-sspr-policy.md
5555
- name: Licenses
5656
href: concept-sspr-licensing.md
57-
- name: Multifactor Authentication
57+
- name: Multifactor authentication
5858
items:
5959
- name: How MFA works
6060
href: concept-mfa-howitworks.md
@@ -130,13 +130,13 @@
130130
href: /windows/security/identity-protection/hello-for-business/hello-identity-verification
131131
- name: Certificate-based authentication
132132
items:
133-
- name: Azure AD CBA
133+
- name: Microsoft Entra CBA
134134
items:
135135
- name: Overview
136136
href: concept-certificate-based-authentication.md
137-
- name: How Azure AD CBA works
137+
- name: How Microsoft Entra CBA works
138138
href: concept-certificate-based-authentication-technical-deep-dive.md
139-
- name: Configure Azure AD CBA
139+
- name: Configure Microsoft Entra CBA
140140
href: how-to-certificate-based-authentication.md
141141
- name: Windows smart card logon
142142
href: concept-certificate-based-authentication-smartcard.md
@@ -150,7 +150,7 @@
150150
href: concept-certificate-based-authentication-migration.md
151151
- name: FAQ
152152
href: certificate-based-authentication-faq.yml
153-
- name: Federated CBA with Azure AD
153+
- name: Federated CBA with Microsoft Entra ID
154154
items:
155155
- name: Configure CBA with federation
156156
href: certificate-based-authentication-federation-get-started.md
@@ -180,7 +180,7 @@
180180
href: howto-sspr-authenticationdata.md
181181
- name: SSPR for Windows clients
182182
href: howto-sspr-windows.md
183-
- name: Azure AD Multi-Factor Authentication
183+
- name: Microsoft Entra multifactor authentication
184184
items:
185185
- name: Deployment guide
186186
href: howto-mfa-getstarted.md
@@ -212,7 +212,7 @@
212212
href: howto-mfa-nps-extension.md
213213
- name: Advanced configuration for NPS extension
214214
href: howto-mfa-nps-extension-advanced.md
215-
- name: Azure VPN and Azure AD MFA
215+
- name: Azure VPN and Microsoft Entra multifactor authentication
216216
href: ../../vpn-gateway/vpn-gateway-radius-mfa-nsp.md
217217
- name: Remote Desktop Gateway
218218
href: howto-mfa-nps-extension-rdg.md
@@ -238,7 +238,7 @@
238238
href: howto-password-ban-bad-on-premises-faq.yml
239239
- name: Agent version history
240240
href: howto-password-ban-bad-on-premises-agent-versions.md
241-
- name: Azure AD smart lockout
241+
- name: Microsoft Entra smart lockout
242242
href: howto-password-smart-lockout.md
243243
- name: Reporting
244244
items:
@@ -252,7 +252,7 @@
252252
href: howto-mfa-reporting-datacollection.md
253253
- name: MFA Server
254254
items:
255-
- name: Migrate MFA Server to Azure AD MFA
255+
- name: Migrate MFA Server to Microsoft Entra multifactor authentication
256256
items:
257257
- name: Overview
258258
href: how-to-migrate-mfa-server-to-azure-mfa.md

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
### YamlMime:FAQ
22
metadata:
3-
title: Azure AD certificate-based authentication (CBA) FAQ
4-
description: Frequently asked questions and answers related to Azure AD certificate-based authentication (CBA).
3+
title: Microsoft Entra certificate-based authentication (CBA) FAQ
4+
description: Frequently asked questions and answers related to Microsoft Entra certificate-based authentication (CBA).
55

66
services: multi-factor-authentication
77
ms.service: active-directory
@@ -14,17 +14,17 @@ metadata:
1414
manager: amycolannino
1515
ms.reviewer: vimrang
1616
ms.collection: M365-identity-device-management
17-
title: Frequently asked questions about Azure AD certificate-based authentication (CBA)
17+
title: Frequently asked questions about Microsoft Entra certificate-based authentication (CBA)
1818
summary: |
19-
This article addresses frequently asked questions about how Azure AD certificate-based authentication (CBA) works.
19+
This article addresses frequently asked questions about how Microsoft Entra certificate-based authentication (CBA) works.
2020
Keep checking back for updated content.
2121
2222
2323
sections:
2424
- name: General
2525
questions:
2626
- question: |
27-
Why don't I see an option to sign in to Azure Active Directory by using certificates after I enter my username?
27+
Why don't I see an option to sign in to Microsoft Entra ID by using certificates after I enter my username?
2828
answer: |
2929
An administrator needs to enable CBA for the tenant to make the sign-in with certificate option available for users. For more information, see [Step 3: Configure authentication binding policy](how-to-certificate-based-authentication.md#step-3-configure-authentication-binding-policy).
3030
@@ -35,22 +35,22 @@ sections:
3535
To get more diagnostic information, check the **Sign-ins report**.
3636
3737
- question: |
38-
How can an administrator enable Azure AD CBA?
38+
How can an administrator enable Microsoft Entra CBA?
3939
answer: |
4040
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
4141
2. Browse to **Protection** > **Authentication methods** > **Policies**.
4242
3. Select policy: **Certificate-based Authentication**.
4343
4. On the **Enable and Target** tab, select the **Enable** toggle to enable certificate-based authentication.
4444
4545
- question: |
46-
Is Azure AD CBA a free feature?
46+
Is Microsoft Entra CBA a free feature?
4747
answer: |
4848
Certificate-based authentication is a free feature.
4949
Every edition of Azure AD includes Azure AD CBA.
5050
For more information about features in each Azure AD edition, see [Azure AD pricing](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
5151
5252
- question: |
53-
Does Azure AD CBA support Alternate ID as the username instead of userPrincipalName?
53+
Does Microsoft Entra CBA support Alternate ID as the username instead of userPrincipalName?
5454
answer: |
5555
No, sign-in using a non-UPN value, such as an alternate email, isn't supported now.
5656

articles/active-directory/authentication/certificate-based-authentication-federation-android.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ ms.reviewer: annaba
1616

1717
ms.collection: M365-identity-device-management
1818
---
19-
# Azure Active Directory certificate-based authentication with federation on Android
19+
# Microsoft Entra certificate-based authentication with federation on Android
2020

21-
Android devices can use certificate-based authentication (CBA) to authenticate to Azure Active Directory using a client certificate on their device when connecting to:
21+
Android devices can use certificate-based authentication (CBA) to authenticate to Microsoft Entra ID using a client certificate on their device when connecting to:
2222

2323
* Office mobile applications such as Microsoft Outlook and Microsoft Word
2424
* Exchange ActiveSync (EAS) clients
@@ -47,14 +47,14 @@ The device OS version must be Android 5.0 (Lollipop) and above.
4747

4848
A federation server must be configured.
4949

50-
For Azure Active Directory to revoke a client certificate, the AD FS token must have the following claims:
50+
For Microsoft Entra ID to revoke a client certificate, the AD FS token must have the following claims:
5151

5252
* `http://schemas.microsoft.com/ws/2008/06/identity/claims/<serialnumber>`
5353
(The serial number of the client certificate)
5454
* `http://schemas.microsoft.com/2012/12/certificatecontext/field/<issuer>`
5555
(The string for the issuer of the client certificate)
5656

57-
Azure Active Directory adds these claims to the refresh token if they're available in the AD FS token (or any other SAML token). When the refresh token needs to be validated, this information is used to check the revocation.
57+
Microsoft Entra ID adds these claims to the refresh token if they're available in the AD FS token (or any other SAML token). When the refresh token needs to be validated, this information is used to check the revocation.
5858

5959
As a best practice, you should update your organization's AD FS error pages with the following information:
6060

@@ -63,7 +63,7 @@ As a best practice, you should update your organization's AD FS error pages with
6363

6464
For more information, see [Customizing the AD FS Sign-in Pages](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn280950(v=ws.11)).
6565

66-
Office apps with modern authentication enabled send '*prompt=login*' to Azure AD in their request. By default, Azure AD translates '*prompt=login*' in the request to AD FS as '*wauth=usernamepassworduri*' (asks AD FS to do U/P Auth) and '*wfresh=0*' (asks AD FS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, you need to modify the default Azure AD behavior. Set the '*PromptLoginBehavior*' in your federated domain settings to '*Disabled*'.
66+
Office apps with modern authentication enabled send '*prompt=login*' to Microsoft Entra ID in their request. By default, Microsoft Entra ID translates '*prompt=login*' in the request to AD FS as '*wauth=usernamepassworduri*' (asks AD FS to do U/P Auth) and '*wfresh=0*' (asks AD FS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, you need to modify the default Microsoft Entra behavior. Set the '*PromptLoginBehavior*' in your federated domain settings to '*Disabled*'.
6767
You can use the [MSOLDomainFederationSettings](/powershell/module/msonline/set-msoldomainfederationsettings) cmdlet to perform this task:
6868

6969
```powershell

0 commit comments

Comments
 (0)