Skip to content

Commit f415c2c

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-rbac-role-definitions-terminology
2 parents aa7ddc6 + 23af772 commit f415c2c

File tree

65 files changed

+694
-579
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

65 files changed

+694
-579
lines changed

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ The **Localization** element enables you to support multiple locales or language
2424
The following IDs are used for a content definition with an ID of `api.signuporsignin`, and [self-asserted technical profile](self-asserted-technical-profile.md).
2525

2626
| ID | Default value | Page Layout Version |
27-
| -- | ------------- | ------ |
27+
| --- | ------------- | ------ |
2828
| **forgotpassword_link** | Forgot your password? | `All` |
2929
| **createaccount_intro** | Don't have an account? | `All` |
3030
| **button_signin** | Sign in | `All` |
@@ -92,7 +92,7 @@ The following example localizes the Facebook identity provider to Arabic:
9292
### Sign-up or sign-in error messages
9393

9494
| ID | Default value |
95-
| -- | ------------- |
95+
| --- | ------------- |
9696
| **UserMessageIfInvalidPassword** | Your password is incorrect. |
9797
| **UserMessageIfPasswordExpired**| Your password has expired.|
9898
| **UserMessageIfClaimsPrincipalDoesNotExist** | We can't seem to find your account. |
@@ -142,7 +142,7 @@ The following example localizes the Facebook identity provider to Arabic:
142142
The following are the IDs for a content definition with an ID of `api.localaccountsignup` or any content definition that starts with `api.selfasserted`, such as `api.selfasserted.profileupdate` and `api.localaccountpasswordreset`, and [self-asserted technical profile](self-asserted-technical-profile.md).
143143

144144
| ID | Default value |
145-
| -- | ------------- |
145+
| --- | ------------- |
146146
| **ver_sent** | Verification code has been sent to: |
147147
| **ver_but_default** | Default |
148148
| **cancel_message** | The user has canceled entering self-asserted information |
@@ -181,7 +181,7 @@ The following are the IDs for a content definition with an ID of `api.localaccou
181181
### Sign-up and self-asserted pages error messages
182182

183183
| ID | Default value |
184-
| -- | ------------- |
184+
| --- | ------------- |
185185
| **UserMessageIfClaimsPrincipalAlreadyExists** | A user with the specified ID already exists. Please choose a different one. |
186186
| **UserMessageIfClaimNotVerified** | Claim not verified: {0} |
187187
| **UserMessageIfIncorrectPattern** | Incorrect pattern for: {0} |
@@ -255,7 +255,7 @@ The following example shows the use of some of the user interface elements in th
255255
The Following are the IDs for a content definition with an ID of `api.phonefactor`, and [phone factor technical profile](phone-factor-technical-profile.md).
256256

257257
| ID | Default value | Page Layout Version |
258-
| -- | ------------- | ------ |
258+
| --- | ------------- | ------ |
259259
| **button_verify** | Call Me | `All` |
260260
| **country_code_label** | Country Code | `All` |
261261
| **cancel_message** | The user has canceled multi-factor authentication | `All` |
@@ -279,7 +279,7 @@ The Following are the IDs for a content definition with an ID of `api.phonefacto
279279
| **invalid_number** | Please enter a valid phone number | `All` |
280280
| **intro_sms** | We have the following number on record for you. We will send a code via SMS to authenticate you. | `All` |
281281
| **intro_entry_mixed** | Enter a number below that we can send a code via SMS or phone to authenticate you. | `All` |
282-
| **number_pattern** | ^\\+(?:[0-9][\\x20-]?){6,14}[0-9]$ | `All` |
282+
| **number_pattern** | `^\\+(?:[0-9][\\x20-]?){6,14}[0-9]$` | `All` |
283283
| **intro_sms_p** |We have the following numbers on record for you. Choose a number that we can send a code via SMS to authenticate you. | `All` |
284284
| **requiredField_countryCode** | Please select your country code | `All` |
285285
| **requiredField_number** | Please enter your phone number | `All` |
@@ -357,7 +357,7 @@ The following example shows the use of some of the user interface elements in th
357357
The following are the IDs for a [Verification display control](display-control-verification.md) with [page layout version](page-layout.md) 2.1.0 or higher.
358358

359359
| ID | Default value |
360-
| -- | ------------- |
360+
| --- | ------------- |
361361
|intro_msg <sup>*</sup>| Verification is necessary. Please click Send button.|
362362
|success_send_code_msg | Verification code has been sent. Please copy it to the input box below.|
363363
|failure_send_code_msg | We are having trouble verifying your email address. Please enter a valid email address and try again.|
@@ -398,7 +398,7 @@ Note: The `intro_msg` element is hidden, and not shown on the self-asserted page
398398
The following are the IDs for a [Verification display control](display-control-verification.md) with [page layout version](page-layout.md) 2.0.0.
399399

400400
| ID | Default value |
401-
| -- | ------------- |
401+
| --- | ------------- |
402402
|verification_control_but_change_claims |Change |
403403
|verification_control_fail_send_code |Failed to send the code, please try again later. |
404404
|verification_control_fail_verify_code |Failed to verify the code, please try again later. |
@@ -428,7 +428,7 @@ The following are the IDs for a [Verification display control](display-control-v
428428
The following are the IDs for [Restful service technical profile](restful-technical-profile.md) error messages:
429429

430430
| ID | Default value |
431-
| -- | ------------- |
431+
| --- | ------------- |
432432
|DefaultUserMessageIfRequestFailed | Failed to establish connection to restful service end point. Restful service URL: {0} |
433433
|UserMessageIfCircuitOpen | {0} Restful Service URL: {1} |
434434
|UserMessageIfDnsResolutionFailed | Failed to resolve the hostname of the restful service endpoint. Restful service URL: {0} |
@@ -453,7 +453,7 @@ The following are the IDs for [Restful service technical profile](restful-techni
453453
The following are the IDs for an [Azure AD MFA technical profile](multi-factor-auth-technical-profile.md) error message:
454454

455455
| ID | Default value |
456-
| -- | ------------- |
456+
| --- | ------------- |
457457
|UserMessageIfCouldntSendSms | Cannot Send SMS to the phone, please try another phone number. |
458458
|UserMessageIfInvalidFormat | Your phone number is not in a valid format, please correct it and try again.|
459459
|UserMessageIfMaxAllowedCodeRetryReached | Wrong code entered too many times, please try again later.|
@@ -481,7 +481,7 @@ The following are the IDs for an [Azure AD MFA technical profile](multi-factor-a
481481
The following are the IDs for [Azure AD SSPR technical profile](aad-sspr-technical-profile.md) error messages:
482482

483483
| ID | Default value |
484-
| -- | ------------- |
484+
| --- | ------------- |
485485
|UserMessageIfChallengeExpired | The code has expired.|
486486
|UserMessageIfInternalError | The email service has encountered an internal error, please try again later.|
487487
|UserMessageIfThrottled | You have sent too many requests, please try again later.|
@@ -507,8 +507,8 @@ The following are the IDs for [Azure AD SSPR technical profile](aad-sspr-technic
507507

508508
The following are the IDs for a [one-time password technical profile](one-time-password-technical-profile.md) error messages
509509

510-
| ID | Default value |
511-
| -- | ------------- |
510+
| ID | Default value | Description |
511+
| --- | ------------- | ----------- |
512512
| UserMessageIfSessionDoesNotExist | No | The message to display to the user if the code verification session has expired. It is either the code has expired or the code has never been generated for a given identifier. |
513513
| UserMessageIfMaxRetryAttempted | No | The message to display to the user if they've exceeded the maximum allowed verification attempts. |
514514
| UserMessageIfMaxNumberOfCodeGenerated | No | The message to display to the user if the code generation has exceeded the maximum allowed number of attempts. |
@@ -536,7 +536,7 @@ The following are the IDs for a [one-time password technical profile](one-time-p
536536
The following are the IDs for claims transformations error messages:
537537

538538
| ID | Claims transformation | Default value |
539-
| -- | ------------- |------------- |
539+
| --- | ------------- |------------- |
540540
|UserMessageIfClaimsTransformationBooleanValueIsNotEqual |[AssertBooleanClaimIsEqualToValue](boolean-transformations.md#assertbooleanclaimisequaltovalue) | Boolean claim value comparison failed for claim type "inputClaim".|
541541
|DateTimeGreaterThan |[AssertDateTimeIsGreaterThan](date-transformations.md#assertdatetimeisgreaterthan) | Claim value comparison failed: The provided left operand is greater than the right operand.|
542542
|UserMessageIfClaimsTransformationStringsAreNotEqual |[AssertStringClaimsAreEqual](string-transformations.md#assertstringclaimsareequal) | Claim value comparison failed using StringComparison "OrdinalIgnoreCase".|

articles/active-directory/app-provisioning/on-premises-ecma-troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -183,7 +183,7 @@ You might get an error message when you install the cloud provisioning agent.
183183

184184
This problem is typically caused by the agent being unable to execute the PowerShell registration scripts because of local PowerShell execution policies.
185185

186-
To resolve this problem, change the PowerShell execution policies on the server. You need to have Machine and User policies set as *Undefined* or *RemoteSigned*. If they're set as *Unrestricted*, you'll see this error. For more information, see [PowerShell execution policies](/powershell/module/microsoft.powershell.core/about/about_execution_policies?view=powershell-6).
186+
To resolve this problem, change the PowerShell execution policies on the server. You need to have Machine and User policies set as *Undefined* or *RemoteSigned*. If they're set as *Unrestricted*, you'll see this error. For more information, see [PowerShell execution policies](/powershell/module/microsoft.powershell.core/about/about_execution_policies).
187187

188188
### Log files
189189

@@ -215,7 +215,7 @@ By using Azure AD, you can monitor the provisioning service in the cloud and col
215215
```
216216

217217
### I am getting an Invalid LDAP style DN error when trying to configure the ECMA Connector Host with SQL
218-
By default, the genericSQL connector expects the DN to be populated using the LDAP style (when the DN is anchor attribute is left unchecked in the first connectivity page). In the error message above, you can see that the DN is a UPN, rather than an LDAP style DN that the connector expects.
218+
By default, the genericSQL connector expects the DN to be populated using the LDAP style (when the 'DN is anchor' attribute is left unchecked in the first connectivity page). In the error message above, you can see that the DN is a UPN, rather than an LDAP style DN that the connector expects.
219219

220220
To resolve this, ensure that **Autogenerated** is selected on the object types page when you configure the connector.
221221

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md

Lines changed: 17 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,14 @@
11
---
22
title: Migrate to Azure AD MFA with federations - Azure Active Directory
33
description: Step-by-step guidance to move from Azure MFA Server on-premises to Azure AD MFA with federation
4-
5-
services: multi-factor-authentication
64
ms.service: active-directory
75
ms.subservice: authentication
86
ms.topic: how-to
97
ms.date: 06/22/2021
10-
118
ms.author: BaSelden
129
author: BarbaraSelden
1310
manager: daveba
1411
ms.reviewer: michmcla
15-
1612
ms.collection: M365-identity-device-management
1713
---
1814
# Migrate to Azure AD MFA with federation
@@ -31,7 +27,7 @@ To create new conditional access policies, you'll need to assign those policies
3127

3228
You'll also need an Azure AD security group for iteratively migrating users to Azure AD MFA. These groups are used in your claims rules.
3329

34-
Dont reuse groups that are used for security. If you are using a security group to secure a group of high-value apps via a Conditional Access policy, that should be the only use of that group.
30+
Don't reuse groups that are used for security. If you are using a security group to secure a group of high-value apps via a Conditional Access policy, that should be the only use of that group.
3531

3632
## Prepare AD FS
3733

@@ -62,13 +58,13 @@ Get-AdfsAdditionalAuthenticationRule
6258
To view existing relying party trusts, run the following command and replace RPTrustName with the name of the relying party trust claims rule:
6359

6460
```powershell
65-
(Get-AdfsRelyingPartyTrust -Name RPTrustName).AdditionalAuthenticationRules
61+
(Get-AdfsRelyingPartyTrust -Name "RPTrustName").AdditionalAuthenticationRules
6662
```
6763

6864
#### Access control policies
6965

7066
> [!NOTE]
71-
> Access control policies cant be configured so that a specific authentication provider is invoked based on group membership.
67+
> Access control policies can't be configured so that a specific authentication provider is invoked based on group membership.
7268
7369

7470
To transition from access control policies to additional authentication rules, run the following command for each of your Relying Party Trusts using the MFA Server authentication provider:
@@ -89,13 +85,13 @@ You'll need to have a specific group in which you place users for whom you want
8985

9086
To find the group SID, use the following command, with your group name
9187

92-
`Get-ADGroup GroupName`
88+
`Get-ADGroup "GroupName"`
9389

9490
![Image of screen shot showing the results of the Get-ADGroup script.](./media/how-to-migrate-mfa-server-to-azure-mfa-user-authentication/find-the-sid.png)
9591

9692
#### Setting the claims rules to call Azure MFA
9793

98-
The following PowerShell cmdlets invoke Azure AD MFA for users in the group when not on the corporate network. Replace "YourGroupSid with the SID found by running the above cmdlet.
94+
The following PowerShell cmdlets invoke Azure AD MFA for users in the group when not on the corporate network. Replace "YourGroupSid" with the SID found by running the above cmdlet.
9995

10096
Make sure you review the [How to Choose Additional Auth Providers in 2019](/windows-server/identity/ad-fs/overview/whats-new-active-directory-federation-services-windows-server).
10197

@@ -109,7 +105,7 @@ Make sure you review the [How to Choose Additional Auth Providers in 2019](/wind
109105
Run the following PowerShell cmdlet:
110106

111107
```powershell
112-
(Get-AdfsRelyingPartyTrust -Name RPTrustName).AdditionalAuthenticationRules
108+
(Get-AdfsRelyingPartyTrust -Name "RPTrustName").AdditionalAuthenticationRules
113109
```
114110

115111

@@ -123,7 +119,7 @@ Value = "AzureMfaAuthentication");
123119
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
124120
Value=="YourGroupSid"]) => issue(Type =
125121
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
126-
"AzureMfaServerAuthentication");
122+
"AzureMfaServerAuthentication");'
127123
```
128124

129125
The following example assumes your current claim rules are configured to prompt for MFA when users connect from outside your network. This example includes the additional rules that you need to append.
@@ -134,12 +130,12 @@ Set-AdfsAdditionalAuthenticationRule -AdditionalAuthenticationRules 'c:[type ==
134130
"https://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod", value =
135131
"https://schemas.microsoft.com/claims/multipleauthn" );
136132
c:[Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
137-
YourGroupSID"] => issue(Type = "https://schemas.microsoft.com/claims/authnmethodsproviders",
133+
"YourGroupSID"] => issue(Type = "https://schemas.microsoft.com/claims/authnmethodsproviders",
138134
Value = "AzureMfaAuthentication");
139135
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
140-
Value==YourGroupSid"]) => issue(Type =
136+
Value=="YourGroupSid"]) => issue(Type =
141137
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
142-
"AzureMfaServerAuthentication");
138+
"AzureMfaServerAuthentication");'
143139
```
144140

145141

@@ -153,12 +149,12 @@ Set-AdfsRelyingPartyTrust -TargetName AppA -AdditionalAuthenticationRules 'c:[ty
153149
"https://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationmethod", value =
154150
"https://schemas.microsoft.com/claims/multipleauthn" );
155151
c:[Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
156-
YourGroupSID"] => issue(Type = "https://schemas.microsoft.com/claims/authnmethodsproviders",
152+
"YourGroupSID"] => issue(Type = "https://schemas.microsoft.com/claims/authnmethodsproviders",
157153
Value = "AzureMfaAuthentication");
158154
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
159-
Value==YourGroupSid"]) => issue(Type =
155+
Value=="YourGroupSid"]) => issue(Type =
160156
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
161-
"AzureMfaServerAuthentication");
157+
"AzureMfaServerAuthentication");'
162158
```
163159

164160

@@ -180,7 +176,7 @@ For federated domains, MFA may be enforced by Azure AD Conditional Access or by
180176

181177
If the SupportsMFA flag is set to False, you're likely not using Azure MFA; you're probably using claims rules on AD FS relying parties to invoke MFA.
182178

183-
You can check the status of your SupportsMFA flag with the following [Windows PowerShell cmdlet](/powershell/module/msonline/get-msoldomainfederationsettings?view=azureadps-1.0):
179+
You can check the status of your SupportsMFA flag with the following [Windows PowerShell cmdlet](/powershell/module/msonline/get-msoldomainfederationsettings):
184180

185181
```powershell
186182
Get-MsolDomainFederationSettings –DomainName yourdomain.com
@@ -276,7 +272,7 @@ You'll need to interpret, clean, and format the data.
276272

277273
Users may have already registered phone numbers in Azure AD. When you import the phone numbers using the Authentication Methods API, you must decide whether to overwrite the existing phone number or to add the imported number as an alternate phone number.
278274

279-
The following PowerShell cmdlets takes the CSV file you supply and adds the exported phone numbers as a phone number for each UPN using the Authentication Methods API. Replace "myPhones with the name of your CSV file.
275+
The following PowerShell cmdlets takes the CSV file you supply and adds the exported phone numbers as a phone number for each UPN using the Authentication Methods API. Replace "myPhones" with the name of your CSV file.
280276

281277
```powershell
282278
@@ -325,12 +321,12 @@ For example, remove the following from the rule(s):
325321

326322
```console
327323
c:[Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid", Value ==
328-
**YourGroupSID**"] => issue(Type = "https://schemas.microsoft.com/claims/authnmethodsproviders",
324+
"**YourGroupSID**"] => issue(Type = "https://schemas.microsoft.com/claims/authnmethodsproviders",
329325
Value = "AzureMfaAuthentication");
330326
not exists([Type == "https://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid",
331327
Value=="YourGroupSid"]) => issue(Type =
332328
"https://schemas.microsoft.com/claims/authnmethodsproviders", Value =
333-
"AzureMfaServerAuthentication");
329+
"AzureMfaServerAuthentication");'
334330
```
335331

336332
### Disable MFA Server as an authentication provider in AD FS

0 commit comments

Comments
 (0)