Skip to content

Commit f498987

Browse files
authored
Merge pull request #240156 from MicrosoftDocs/main
Publish to live, Friday 4 AM PST, 6/2
2 parents 8781887 + aaf890d commit f498987

File tree

113 files changed

+1129
-513
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

113 files changed

+1129
-513
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6155,7 +6155,11 @@
61556155
"source_path_from_root": "/articles/azure-monitor/app/opentelemetry-dotnet-exporter.md",
61566156
"redirect_url": "/azure/azure-monitor/app/opentelemetry-enable",
61576157
"redirect_document_id": false
6158+
},
6159+
{
6160+
"source_path_from_root": "/articles/azure-monitor/logs/api/app-insights-azure-ad-api.md",
6161+
"redirect_url": "/azure/azure-monitor/app/app-insights-azure-ad-api",
6162+
"redirect_document_id": false
61586163
}
6159-
61606164
]
61616165
}

articles/active-directory-domain-services/template-create-instance.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: domain-services
1010
ms.workload: identity
1111
ms.custom: devx-track-arm-template
1212
ms.topic: sample
13-
ms.date: 01/29/2023
13+
ms.date: 06/01/2023
1414
ms.author: justinha
1515
---
1616
# Create an Azure Active Directory Domain Services managed domain using an Azure Resource Manager template
@@ -67,10 +67,10 @@ First, register the Azure AD Domain Services resource provider using the [Regist
6767
Register-AzResourceProvider -ProviderNamespace Microsoft.AAD
6868
```
6969

70-
Create an Azure AD service principal using the [New-AzureADServicePrincipal][New-AzureADServicePrincipal] cmdlet for Azure AD DS to communicate and authenticate itself. A specific application ID is used named *Domain Controller Services* with an ID of *6ba9a5d4-8456-4118-b521-9c5ca10cdf84*. Don't change this application ID.
70+
Create an Azure AD service principal using the [New-AzureADServicePrincipal][New-AzureADServicePrincipal] cmdlet for Azure AD DS to communicate and authenticate itself. A specific application ID is used named *Domain Controller Services* with an ID of *2565bd9d-da50-47d4-8b85-4c97f669dc36* for Azure Global. For other Azure clouds, search for AppId value *6ba9a5d4-8456-4118-b521-9c5ca10cdf84*.
7171

7272
```powershell
73-
New-AzureADServicePrincipal -AppId "6ba9a5d4-8456-4118-b521-9c5ca10cdf84"
73+
New-AzureADServicePrincipal -AppId "2565bd9d-da50-47d4-8b85-4c97f669dc36"
7474
```
7575

7676
Now create an Azure AD group named *AAD DC Administrators* using the [New-AzureADGroup][New-AzureADGroup] cmdlet. Users added to this group are then granted permissions to perform administration tasks on the managed domain.

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/30/2023
9+
ms.date: 06/01/2023
1010

1111
ms.author: justinha
1212
author: calui
@@ -135,7 +135,7 @@ Email as an alternate login ID applies to [Azure AD B2B collaboration](../extern
135135
136136
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
137137

138-
During preview, you currently need *Global Administrator* permissions to enable sign-in with email as an alternate login ID. You can use either Azure portal or PowerShell to set up the feature.
138+
During preview, you currently need *Global Administrator* permissions to enable sign-in with email as an alternate login ID. You can use either Azure portal or Graph PowerShell to set up the feature.
139139

140140
### Azure portal
141141

@@ -159,7 +159,7 @@ With the policy applied, it can take up to 1 hour to propagate and for users to
159159
160160
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign-in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
161161

162-
During preview, you can currently only enable email as an alternate login ID using PowerShell or the Microsoft Graph API. You need *Global Administrator* privileges to complete the following steps:
162+
You need *Global Administrator* privileges to complete the following steps:
163163

164164
1. Open a PowerShell session as an administrator, then install the *Microsoft.Graph* module using the `Install-Module` cmdlet:
165165

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 10/04/2022
9+
ms.date: 06/01/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -41,7 +41,7 @@ To view the sign-in activity report in the [Azure portal](https://portal.azure.c
4141
1. Under *Activity* from the menu on the left-hand side, select **Sign-ins**.
4242
1. A list of sign-in events is shown, including the status. You can select an event to view more details.
4343

44-
The **Authentication Details** or **Conditional Access** tab of the event details shows you the status code or which policy triggered the MFA prompt.
44+
The **Conditional Access** tab of the event details shows you which policy triggered the MFA prompt.
4545

4646
[![Screenshot of example Azure Active Directory sign-ins report in the Azure portal](media/howto-mfa-reporting/sign-in-report-cropped.png)](media/howto-mfa-reporting/sign-in-report.png#lightbox)
4747

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 06/01/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -51,7 +51,7 @@ To add authentication methods for a user via the Azure portal:
5151
> [!NOTE]
5252
> The preview experience allows administrators to add any available authentication methods for users, while the original experience only allows updating of phone and alternate phone methods.
5353
54-
### Manage methods using PowerShell:
54+
### Manage methods using PowerShell
5555

5656
Install the Microsoft.Graph.Identity.Signins PowerShell module using the following commands.
5757

@@ -79,7 +79,7 @@ Remove a specific phone method for a user
7979
Remove-MgUserAuthenticationPhoneMethod -UserId [email protected] -PhoneAuthenticationMethodId 3179e48a-750b-4051-897c-87b9720928f7
8080
```
8181

82-
Authentication methods can also be managed using Microsoft Graph APIs, more information can be found in the document [Azure AD authentication methods API overview](/graph/api/resources/authenticationmethods-overview)
82+
Authentication methods can also be managed using Microsoft Graph APIs. For more information, see [Authentication and authorization basics](/graph/auth/auth-concepts).
8383

8484
## Manage user authentication options
8585

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 03/23/2023
9+
ms.date: 06/01/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -92,6 +92,7 @@ The following core requirements apply:
9292
| --- | --- |
9393
|`https://login.microsoftonline.com`|Authentication requests|
9494
|`https://enterpriseregistration.windows.net`|Azure AD Password Protection functionality|
95+
|`https://autoupdate.msappproxaxy.net` | Azure AD Password Protection auto-upgrade functionality |
9596

9697
> [!NOTE]
9798
> Some endpoints, such as the CRL endpoint, are not addressed in this article. For a list of all supported endpoints, see [Microsoft 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges#microsoft-365-common-and-office-online).
@@ -164,6 +165,7 @@ Choose one or more servers to host the Azure AD Password Protection proxy servic
164165
* You can run the Azure AD Password Protection proxy service on a domain controller for testing, but that domain controller then requires internet connectivity. This connectivity can be a security concern. We recommend this configuration for testing only.
165166
* We recommend at least two Azure AD Password Protection proxy servers per forest for redundancy, as noted in the previous section on [high availability considerations](#high-availability-considerations).
166167
* It's not supported to run the Azure AD Password Protection proxy service on a read-only domain controller.
168+
* If necessary, you can remove the proxy service by using **Add or remove programs**. No manual cleanup of the state that the proxy service maintains is needed.
167169

168170
To install the Azure AD Password Protection proxy service, complete the following steps:
169171

20.2 KB
Loading

articles/active-directory/develop/TOC.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -461,8 +461,7 @@
461461
- name: Customize SAML claims
462462
href: saml-claims-customization.md
463463
- name: Set an access token lifetime policy
464-
href: configure-token-lifetimes.md
465-
464+
href: configure-token-lifetimes.md
466465
- name: SAML app multi-instancing
467466
displayName: Configure SAML app multi-instancing for an application
468467
href: reference-app-multi-instancing.md
@@ -580,7 +579,9 @@
580579
- name: Token claims reference
581580
items:
582581
- name: Access token
583-
href: access-token-claims-reference.md
582+
href: access-token-claims-reference.md
583+
- name: ID token
584+
href: id-token-claims-reference.md
584585
- name: SAML token
585586
href: reference-saml-tokens.md
586587
- name: Microsoft Authentication Library (MSAL) reference

articles/active-directory/develop/accounts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ String issuer = account.getClaims().get("iss"); // The tenant specific authority
113113
```
114114

115115
> [!TIP]
116-
> To see a list of claims available from the account object, refer to [claims in an id_token](./id-tokens.md#claims-in-an-id-token)
116+
> To see a list of claims available from the account object, refer to the [ID token claims reference](./id-token-claims-reference.md).
117117
118118
> [!TIP]
119119
> To include additional claims in your id_token, refer to the optional claims documentation in [How to: Provide optional claims to your Azure AD app](./active-directory-optional-claims.md)

0 commit comments

Comments
 (0)