Skip to content

Commit f3ecbb7

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into async
2 parents 875be53 + 1597332 commit f3ecbb7

File tree

4,322 files changed

+69004
-37018
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

4,322 files changed

+69004
-37018
lines changed

.gitignore

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,4 +25,4 @@ AzureMigration.ps1
2525
**/.vscode/settings.json
2626
!/.vscode/settings.json
2727

28-
desktop.ini
28+
desktop.ini

.openpublishing.redirection.json

Lines changed: 320 additions & 62 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.media-services.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -605,6 +605,11 @@
605605
"redirect_url": "transform-custom-preset-cli-how-to",
606606
"redirect_document_id": false
607607
},
608+
{
609+
"source_path_from_root": "/articles/media-services/video-indexer/observed-people-tracing.md",
610+
"redirect_url": "../../media-services/",
611+
"redirect_document_id": false
612+
},
608613
{
609614
"source_path_from_root": "/articles/media-services/latest/encode-custom-preset-rest-how-to.md",
610615
"redirect_url": "transform-custom-preset-rest-how-to",

.whatsnew/.application-proxy.json

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
{
2+
"$schema": "https://whatsnewapi.azurewebsites.net/schema",
3+
"docSetProductName": "Azure Active Directory application proxy",
4+
"rootDirectory": "articles/active-directory/app-proxy/",
5+
"docLinkSettings": {
6+
"linkFormat": "relative",
7+
"relativeLinkPrefix": "/azure/active-directory/app-proxy"
8+
},
9+
"inclusionCriteria": {
10+
"excludePullRequestTitles": true,
11+
"minAdditionsToFile" : 2,
12+
"maxFilesChanged": 50,
13+
"labels": [
14+
"label:active-directory/svc",
15+
"label:app-proxy/subsvc"
16+
]
17+
},
18+
"areas": [
19+
{
20+
"name": ".",
21+
"heading": "Azure Active Directory application proxy"
22+
}
23+
]
24+
}

CODEOWNERS

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -68,9 +68,8 @@ articles/best-practices-availability-paired-regions.md @martinekuan @syntaxc4 @s
6868
# Governance
6969
articles/governance/ @DCtheGeek
7070

71-
# Security baselines
72-
articles/**/*security-baseline.md @msmbaldwin @mgblythe
73-
articles/security/benchmarks/ @msmbaldwin @mgblythe
71+
# Security
72+
articles/security/fundamentals/feature-availability.md @msmbaldwin @terrylanfear
7473

7574
# Azure Security Center
7675
articles/security-center/ @memildin
@@ -83,6 +82,9 @@ articles/ddos-protection @aletheatoh @anupamvi
8382
# Lighthouse
8483
articles/lighthouse/ @JnHs
8584

85+
# Healthcare APIs
86+
articles/healthcare-apis/ @ginalee-dotcom
87+
8688
# Configuration
8789
*.json @SyntaxC4 @snoviking @martinekuan
8890
.acrolinx-config.edn @MonicaRush @martinekuan

articles/active-directory-b2c/TOC.yml

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -274,12 +274,26 @@
274274
href: configure-tokens.md
275275
- name: Define custom attributes
276276
href: user-flow-custom-attributes.md
277-
- name: Risk-based authentication
277+
- name: Security and threat management
278278
items:
279279
- name: Investigate risk with Identity Protection
280280
href: identity-protection-investigate-risk.md
281281
- name: Configure Conditional Access
282282
href: conditional-access-user-flow.md
283+
- name: Mitigate credential attacks
284+
displayName: smart lockout, account lockout, password attack
285+
href: threat-management.md
286+
- name: Fraud protection partners
287+
items:
288+
- name: Arkose Labs
289+
href: partner-arkose-labs.md
290+
displayName: fraud protection, fraud, Azure AD b2c, protection, B2Cprotection
291+
- name: BioCatch
292+
href: partner-biocatch.md
293+
displayName: fraud protection, fraud, Azure AD b2c, protection, B2Cprotection, user behavior
294+
- name: Microsoft Dynamics 365 Fraud Protection
295+
href: partner-dynamics-365-fraud-protection.md
296+
displayName: m365 dynamics, dynamics fraud protection, fraud, 365 protection
283297
- name: Configure age gating
284298
href: age-gating.md
285299
- name: API connectors
@@ -322,17 +336,6 @@
322336
href: partner-lexisnexis.md
323337
- name: Onfido
324338
href: partner-onfido.md
325-
- name: Fraud protection partners
326-
items:
327-
- name: Arkose Labs
328-
href: partner-arkose-labs.md
329-
displayName: fraud protection, fraud, Azure AD b2c, protection, B2Cprotection
330-
- name: BioCatch
331-
href: partner-biocatch.md
332-
displayName: fraud protection, fraud, Azure AD b2c, protection, B2Cprotection, user behavior
333-
- name: Microsoft Dynamics 365 Fraud Protection
334-
href: partner-dynamics-365-fraud-protection.md
335-
displayName: m365 dynamics, dynamics fraud protection, fraud, 365 protection
336339
- name: Secure access to legacy and on-premises apps
337340
items:
338341
- name: Ping Identity
@@ -538,8 +541,6 @@
538541
href: ../active-directory/fundamentals/resilience-b2c-developer-best-practices.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
539542
- name: Monitoring and analytics
540543
href: ../active-directory/fundamentals/resilience-with-monitoring-alerting.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
541-
- name: Threat management
542-
href: threat-management.md
543544
displayName: security
544545
- name: User flow versions
545546
href: user-flow-versions.md

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/22/2021
12+
ms.date: 05/11/2021
1313
ms.custom: project-no-code
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -57,10 +57,10 @@ To enable self-service password reset for the sign-up or sign-in user flow:
5757
1. Select **User flows**.
5858
1. Select a sign-up or sign-in user flow (of type **Recommended**) that you want to customize.
5959
1. Under **Settings** in the left menu, select **Properties**.
60-
1. Under **Password complexity**, select **Self-service password reset**.
60+
1. Under **Password configuration**, select **Self-service password reset**.
6161
1. Select **Save**.
6262
1. Under **Customize** in the left menu, select **Page layouts**.
63-
1. In the **Page Layout Version**, choose **2.1.2 - Current** or above.
63+
1. In the **Page Layout Version**, choose **2.1.3** or above.
6464
1. Select **Save**.
6565

6666
::: zone-end

articles/active-directory-b2c/azure-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ In this article, you learn how to transfer the logs to an Azure Log Analytics wo
3434

3535
## Deployment overview
3636

37-
Azure AD B2C leverages [Azure Active Directory monitoring](../active-directory/reports-monitoring/overview-monitoring.md). To enable *Diagnostic settings* in Azure Active Directory within your Azure AD B2C tenant, you use [Azure Lighthouse](../lighthouse/concepts/azure-delegated-resource-management.md) to [delegate a resource](../lighthouse/concepts/azure-delegated-resource-management.md), which allows your Azure AD B2C (the **Service Provider**) to manage an Azure AD (the **Customer**) resource. After you complete the steps in this article, you'll have access to the *azure-ad-b2c-monitor* resource group that contains the [Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md) in your **Azure AD B2C** portal. You'll also be able to transfer the logs from Azure AD B2C to your Log Analytics workspace.
37+
Azure AD B2C leverages [Azure Active Directory monitoring](../active-directory/reports-monitoring/overview-monitoring.md). To enable *Diagnostic settings* in Azure Active Directory within your Azure AD B2C tenant, you use [Azure Lighthouse](../lighthouse/overview.md) to [delegate a resource](../lighthouse/concepts/architecture.md), which allows your Azure AD B2C (the **Service Provider**) to manage an Azure AD (the **Customer**) resource. After you complete the steps in this article, you'll have access to the *azure-ad-b2c-monitor* resource group that contains the [Log Analytics workspace](../azure-monitor/logs/quick-create-workspace.md) in your **Azure AD B2C** portal. You'll also be able to transfer the logs from Azure AD B2C to your Log Analytics workspace.
3838

3939
During this deployment, you'll authorize a user or group in your Azure AD B2C directory to configure the Log Analytics workspace instance within the tenant that contains your Azure subscription. To create the authorization, you deploy an [Azure Resource Manager](../azure-resource-manager/index.yml) template to your Azure AD tenant containing the subscription.
4040

@@ -255,7 +255,7 @@ The workbook will display reports in the form of a dashboard.
255255

256256
## Create alerts
257257

258-
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events are created, absence of an event, or a number of events are created within a particular time window. For example, alerts can be used to notify you when average number of sign-in exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/tutorial-response.md).
258+
Alerts are created by alert rules in Azure Monitor and can automatically run saved queries or custom log searches at regular intervals. You can create alerts based on specific performance metrics or when certain events are created, absence of an event, or a number of events are created within a particular time window. For example, alerts can be used to notify you when average number of sign-in exceeds a certain threshold. For more information, see [Create alerts](../azure-monitor/alerts/alerts-log.md).
259259

260260

261261
Use the following instructions to create a new Azure Alert, which will send an [email notification](../azure-monitor/alerts/action-groups.md#configure-notifications) whenever there is a 25% drop in the **Total Requests** compare to previous period. Alert will run every 5 minutes and look for the drop within last 24 hours windows. The alerts are created using Kusto query language.

articles/active-directory-b2c/conditional-access-identity-protection-overview.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: overview
9-
ms.date: 03/03/2021
9+
ms.date: 05/13/2021
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -16,8 +16,6 @@ ms.collection: M365-identity-device-management
1616
---
1717
# Identity Protection and Conditional Access for Azure AD B2C
1818

19-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
20-
2119
Enhance the security of Azure Active Directory B2C (Azure AD B2C) with Azure AD Identity Protection and Conditional Access. The Identity Protection risk-detection features, including risky users and risky sign-ins, are automatically detected and displayed in your Azure AD B2C tenant. You can create Conditional Access policies that use these risk detections to determine actions and enforce organizational policies. Together, these capabilities give Azure AD B2C application owners greater control over risky authentications and access policies.
2220

2321
If you're already familiar with [Identity Protection](../active-directory/identity-protection/overview-identity-protection.md) and [Conditional Access](../active-directory/conditional-access/overview.md) in Azure AD, using these capabilities with Azure AD B2C will be a familiar experience, with the minor differences discussed in this article.

articles/active-directory-b2c/conditional-access-technical-profile.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 04/19/2021
12+
ms.date: 05/13/2021
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -20,8 +20,6 @@ ms.subservice: B2C
2020

2121
Azure Active Directory (Azure AD) Conditional Access is the tool used by Azure AD B2C to bring signals together, make decisions, and enforce organizational policies. Automating risk assessment with policy conditions means risky sign-ins are at once identified and remediated or blocked.
2222

23-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
24-
2523
## Protocol
2624

2725
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C:

0 commit comments

Comments
 (0)