You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/localization-string-ids.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ The **Localization** element enables you to support multiple locales or language
24
24
The following IDs are used for a content definition with an ID of `api.signuporsignin`, and [self-asserted technical profile](self-asserted-technical-profile.md).
25
25
26
26
| ID | Default value | Page Layout Version |
27
-
| -- | ------------- | ------ |
27
+
| ---| ------------- | ------ |
28
28
|**forgotpassword_link**| Forgot your password? |`All`|
29
29
|**createaccount_intro**| Don't have an account? |`All`|
30
30
|**button_signin**| Sign in |`All`|
@@ -92,7 +92,7 @@ The following example localizes the Facebook identity provider to Arabic:
92
92
### Sign-up or sign-in error messages
93
93
94
94
| ID | Default value |
95
-
| -- | ------------- |
95
+
| ---| ------------- |
96
96
|**UserMessageIfInvalidPassword**| Your password is incorrect. |
97
97
|**UserMessageIfPasswordExpired**| Your password has expired.|
98
98
|**UserMessageIfClaimsPrincipalDoesNotExist**| We can't seem to find your account. |
@@ -142,7 +142,7 @@ The following example localizes the Facebook identity provider to Arabic:
142
142
The following are the IDs for a content definition with an ID of `api.localaccountsignup` or any content definition that starts with `api.selfasserted`, such as `api.selfasserted.profileupdate` and `api.localaccountpasswordreset`, and [self-asserted technical profile](self-asserted-technical-profile.md).
143
143
144
144
| ID | Default value |
145
-
| -- | ------------- |
145
+
| ---| ------------- |
146
146
|**ver_sent**| Verification code has been sent to: |
147
147
|**ver_but_default**| Default |
148
148
|**cancel_message**| The user has canceled entering self-asserted information |
@@ -181,7 +181,7 @@ The following are the IDs for a content definition with an ID of `api.localaccou
181
181
### Sign-up and self-asserted pages error messages
182
182
183
183
| ID | Default value |
184
-
| -- | ------------- |
184
+
| ---| ------------- |
185
185
|**UserMessageIfClaimsPrincipalAlreadyExists**| A user with the specified ID already exists. Please choose a different one. |
186
186
|**UserMessageIfClaimNotVerified**| Claim not verified: {0} |
@@ -255,7 +255,7 @@ The following example shows the use of some of the user interface elements in th
255
255
The Following are the IDs for a content definition with an ID of `api.phonefactor`, and [phone factor technical profile](phone-factor-technical-profile.md).
256
256
257
257
| ID | Default value | Page Layout Version |
258
-
| -- | ------------- | ------ |
258
+
| ---| ------------- | ------ |
259
259
|**button_verify**| Call Me |`All`|
260
260
|**country_code_label**| Country Code |`All`|
261
261
|**cancel_message**| The user has canceled multi-factor authentication |`All`|
@@ -279,7 +279,7 @@ The Following are the IDs for a content definition with an ID of `api.phonefacto
279
279
|**invalid_number**| Please enter a valid phone number |`All`|
280
280
|**intro_sms**| We have the following number on record for you. We will send a code via SMS to authenticate you. |`All`|
281
281
|**intro_entry_mixed**| Enter a number below that we can send a code via SMS or phone to authenticate you. |`All`|
|**intro_sms_p**|We have the following numbers on record for you. Choose a number that we can send a code via SMS to authenticate you. |`All`|
284
284
|**requiredField_countryCode**| Please select your country code |`All`|
285
285
|**requiredField_number**| Please enter your phone number |`All`|
@@ -357,7 +357,7 @@ The following example shows the use of some of the user interface elements in th
357
357
The following are the IDs for a [Verification display control](display-control-verification.md) with [page layout version](page-layout.md) 2.1.0 or higher.
358
358
359
359
| ID | Default value |
360
-
| -- | ------------- |
360
+
| ---| ------------- |
361
361
|intro_msg <sup>*</sup>| Verification is necessary. Please click Send button.|
362
362
|success_send_code_msg | Verification code has been sent. Please copy it to the input box below.|
363
363
|failure_send_code_msg | We are having trouble verifying your email address. Please enter a valid email address and try again.|
@@ -398,7 +398,7 @@ Note: The `intro_msg` element is hidden, and not shown on the self-asserted page
398
398
The following are the IDs for a [Verification display control](display-control-verification.md) with [page layout version](page-layout.md) 2.0.0.
399
399
400
400
| ID | Default value |
401
-
| -- | ------------- |
401
+
| ---| ------------- |
402
402
|verification_control_but_change_claims |Change |
403
403
|verification_control_fail_send_code |Failed to send the code, please try again later. |
404
404
|verification_control_fail_verify_code |Failed to verify the code, please try again later. |
@@ -428,7 +428,7 @@ The following are the IDs for a [Verification display control](display-control-v
428
428
The following are the IDs for [Restful service technical profile](restful-technical-profile.md) error messages:
429
429
430
430
| ID | Default value |
431
-
| -- | ------------- |
431
+
| ---| ------------- |
432
432
|DefaultUserMessageIfRequestFailed | Failed to establish connection to restful service end point. Restful service URL: {0} |
433
433
|UserMessageIfCircuitOpen | {0} Restful Service URL: {1} |
434
434
|UserMessageIfDnsResolutionFailed | Failed to resolve the hostname of the restful service endpoint. Restful service URL: {0} |
@@ -453,7 +453,7 @@ The following are the IDs for [Restful service technical profile](restful-techni
453
453
The following are the IDs for an [Azure AD MFA technical profile](multi-factor-auth-technical-profile.md) error message:
454
454
455
455
| ID | Default value |
456
-
| -- | ------------- |
456
+
| ---| ------------- |
457
457
|UserMessageIfCouldntSendSms | Cannot Send SMS to the phone, please try another phone number. |
458
458
|UserMessageIfInvalidFormat | Your phone number is not in a valid format, please correct it and try again.|
459
459
|UserMessageIfMaxAllowedCodeRetryReached | Wrong code entered too many times, please try again later.|
@@ -481,7 +481,7 @@ The following are the IDs for an [Azure AD MFA technical profile](multi-factor-a
481
481
The following are the IDs for [Azure AD SSPR technical profile](aad-sspr-technical-profile.md) error messages:
482
482
483
483
| ID | Default value |
484
-
| -- | ------------- |
484
+
| ---| ------------- |
485
485
|UserMessageIfChallengeExpired | The code has expired.|
486
486
|UserMessageIfInternalError | The email service has encountered an internal error, please try again later.|
487
487
|UserMessageIfThrottled | You have sent too many requests, please try again later.|
@@ -507,8 +507,8 @@ The following are the IDs for [Azure AD SSPR technical profile](aad-sspr-technic
507
507
508
508
The following are the IDs for a [one-time password technical profile](one-time-password-technical-profile.md) error messages
509
509
510
-
| ID | Default value |
511
-
| -- | ------------- |
510
+
| ID | Default value | Description |
511
+
| ---| ------------- |----------- |
512
512
| UserMessageIfSessionDoesNotExist | No | The message to display to the user if the code verification session has expired. It is either the code has expired or the code has never been generated for a given identifier. |
513
513
| UserMessageIfMaxRetryAttempted | No | The message to display to the user if they've exceeded the maximum allowed verification attempts. |
514
514
| UserMessageIfMaxNumberOfCodeGenerated | No | The message to display to the user if the code generation has exceeded the maximum allowed number of attempts. |
@@ -536,7 +536,7 @@ The following are the IDs for a [one-time password technical profile](one-time-p
536
536
The following are the IDs for claims transformations error messages:
537
537
538
538
| ID | Claims transformation | Default value |
539
-
| -- | ------------- |------------- |
539
+
| ---| ------------- |------------- |
540
540
|UserMessageIfClaimsTransformationBooleanValueIsNotEqual |[AssertBooleanClaimIsEqualToValue](boolean-transformations.md#assertbooleanclaimisequaltovalue)| Boolean claim value comparison failed for claim type "inputClaim".|
541
541
|DateTimeGreaterThan |[AssertDateTimeIsGreaterThan](date-transformations.md#assertdatetimeisgreaterthan)| Claim value comparison failed: The provided left operand is greater than the right operand.|
542
542
|UserMessageIfClaimsTransformationStringsAreNotEqual |[AssertStringClaimsAreEqual](string-transformations.md#assertstringclaimsareequal)| Claim value comparison failed using StringComparison "OrdinalIgnoreCase".|
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/on-premises-ecma-troubleshoot.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -183,7 +183,7 @@ You might get an error message when you install the cloud provisioning agent.
183
183
184
184
This problem is typically caused by the agent being unable to execute the PowerShell registration scripts because of local PowerShell execution policies.
185
185
186
-
To resolve this problem, change the PowerShell execution policies on the server. You need to have Machine and User policies set as *Undefined* or *RemoteSigned*. If they're set as *Unrestricted*, you'll see this error. For more information, see [PowerShell execution policies](/powershell/module/microsoft.powershell.core/about/about_execution_policies?view=powershell-6).
186
+
To resolve this problem, change the PowerShell execution policies on the server. You need to have Machine and User policies set as *Undefined* or *RemoteSigned*. If they're set as *Unrestricted*, you'll see this error. For more information, see [PowerShell execution policies](/powershell/module/microsoft.powershell.core/about/about_execution_policies).
187
187
188
188
### Log files
189
189
@@ -215,7 +215,7 @@ By using Azure AD, you can monitor the provisioning service in the cloud and col
215
215
```
216
216
217
217
### I am getting an Invalid LDAP style DN error when trying to configure the ECMA Connector Host with SQL
218
-
By default, the genericSQL connector expects the DN to be populated using the LDAP style (when the ‘DN is anchor’ attribute is left unchecked in the first connectivity page). In the error message above, you can see that the DN is a UPN, rather than an LDAP style DN that the connector expects.
218
+
By default, the genericSQL connector expects the DN to be populated using the LDAP style (when the 'DN is anchor' attribute is left unchecked in the first connectivity page). In the error message above, you can see that the DN is a UPN, rather than an LDAP style DN that the connector expects.
219
219
220
220
To resolve this, ensure that **Autogenerated** is selected on the object types page when you configure the connector.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md
+17-21Lines changed: 17 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,18 +1,14 @@
1
1
---
2
2
title: Migrate to Azure AD MFA with federations - Azure Active Directory
3
3
description: Step-by-step guidance to move from Azure MFA Server on-premises to Azure AD MFA with federation
4
-
5
-
services: multi-factor-authentication
6
4
ms.service: active-directory
7
5
ms.subservice: authentication
8
6
ms.topic: how-to
9
7
ms.date: 06/22/2021
10
-
11
8
ms.author: BaSelden
12
9
author: BarbaraSelden
13
10
manager: daveba
14
11
ms.reviewer: michmcla
15
-
16
12
ms.collection: M365-identity-device-management
17
13
---
18
14
# Migrate to Azure AD MFA with federation
@@ -31,7 +27,7 @@ To create new conditional access policies, you'll need to assign those policies
31
27
32
28
You'll also need an Azure AD security group for iteratively migrating users to Azure AD MFA. These groups are used in your claims rules.
33
29
34
-
Don’t reuse groups that are used for security. If you are using a security group to secure a group of high-value apps via a Conditional Access policy, that should be the only use of that group.
30
+
Don't reuse groups that are used for security. If you are using a security group to secure a group of high-value apps via a Conditional Access policy, that should be the only use of that group.
> Access control policies can’t be configured so that a specific authentication provider is invoked based on group membership.
67
+
> Access control policies can't be configured so that a specific authentication provider is invoked based on group membership.
72
68
73
69
74
70
To transition from access control policies to additional authentication rules, run the following command for each of your Relying Party Trusts using the MFA Server authentication provider:
@@ -89,13 +85,13 @@ You'll need to have a specific group in which you place users for whom you want
89
85
90
86
To find the group SID, use the following command, with your group name
91
87
92
-
`Get-ADGroup “GroupName”`
88
+
`Get-ADGroup "GroupName"`
93
89
94
90

95
91
96
92
#### Setting the claims rules to call Azure MFA
97
93
98
-
The following PowerShell cmdlets invoke Azure AD MFA for users in the group when not on the corporate network. Replace "YourGroupSid” with the SID found by running the above cmdlet.
94
+
The following PowerShell cmdlets invoke Azure AD MFA for users in the group when not on the corporate network. Replace "YourGroupSid" with the SID found by running the above cmdlet.
99
95
100
96
Make sure you review the [How to Choose Additional Auth Providers in 2019](/windows-server/identity/ad-fs/overview/whats-new-active-directory-federation-services-windows-server).
101
97
@@ -109,7 +105,7 @@ Make sure you review the [How to Choose Additional Auth Providers in 2019](/wind
@@ -123,7 +119,7 @@ Value = "AzureMfaAuthentication");
123
119
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
124
120
Value=="YourGroupSid"]) => issue(Type =
125
121
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
126
-
"AzureMfaServerAuthentication");’
122
+
"AzureMfaServerAuthentication");'
127
123
```
128
124
129
125
The following example assumes your current claim rules are configured to prompt for MFA when users connect from outside your network. This example includes the additional rules that you need to append.
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
159
-
Value==“YourGroupSid"]) => issue(Type =
155
+
Value=="YourGroupSid"]) => issue(Type =
160
156
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
161
-
"AzureMfaServerAuthentication");’
157
+
"AzureMfaServerAuthentication");'
162
158
```
163
159
164
160
@@ -180,7 +176,7 @@ For federated domains, MFA may be enforced by Azure AD Conditional Access or by
180
176
181
177
If the SupportsMFA flag is set to False, you're likely not using Azure MFA; you're probably using claims rules on AD FS relying parties to invoke MFA.
182
178
183
-
You can check the status of your SupportsMFA flag with the following [Windows PowerShell cmdlet](/powershell/module/msonline/get-msoldomainfederationsettings?view=azureadps-1.0):
179
+
You can check the status of your SupportsMFA flag with the following [Windows PowerShell cmdlet](/powershell/module/msonline/get-msoldomainfederationsettings):
@@ -276,7 +272,7 @@ You'll need to interpret, clean, and format the data.
276
272
277
273
Users may have already registered phone numbers in Azure AD. When you import the phone numbers using the Authentication Methods API, you must decide whether to overwrite the existing phone number or to add the imported number as an alternate phone number.
278
274
279
-
The following PowerShell cmdlets takes the CSV file you supply and adds the exported phone numbers as a phone number for each UPN using the Authentication Methods API. Replace "myPhones” with the name of your CSV file.
275
+
The following PowerShell cmdlets takes the CSV file you supply and adds the exported phone numbers as a phone number for each UPN using the Authentication Methods API. Replace "myPhones" with the name of your CSV file.
280
276
281
277
```powershell
282
278
@@ -325,12 +321,12 @@ For example, remove the following from the rule(s):
325
321
326
322
```console
327
323
c:[Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
0 commit comments