Skip to content

Commit f59e576

Browse files
authored
Merge branch 'main' into cosmos-cassandra-toc-copyedit
2 parents db4cfdd + b46333b commit f59e576

File tree

236 files changed

+2791
-1588
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

236 files changed

+2791
-1588
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1185,6 +1185,11 @@
11851185
"redirect_url": "/azure/role-based-access-control/change-history-report",
11861186
"redirect_document_id": true
11871187
},
1188+
{
1189+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-mfa-get-started.md",
1190+
"redirect_url": "/azure/active-directory/authentication/concept-mfa-licensing",
1191+
"redirect_document_id": true
1192+
},
11881193
{
11891194
"source_path_from_root": "/articles/active-directory/conditional-access-azure-management.md",
11901195
"redirect_url": "/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8767,6 +8767,11 @@
87678767
"redirect_url": "/azure/developer/mobile-apps/azure-maps",
87688768
"redirect_document_id": false
87698769
},
8770+
{
8771+
"source_path_from_root": "/articles/azure-maps/choose-pricing-tier.md",
8772+
"redirect_url": "/azure/azure-maps/how-to-manage-pricing-tier",
8773+
"redirect_document_id": true
8774+
},
87708775
{
87718776
"source_path_from_root": "/articles/azure-maps/how-to-request-real-time-data.md",
87728777
"redirect_url": "/azure/azure-maps",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/managed-grafana/how-to-sync-teams-with-aad-groups.md",
5+
"redirect_url": "/azure/managed-grafana/how-to-sync-teams-with-azure-ad-groups",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

articles/active-directory/app-provisioning/inbound-provisioning-api-postman.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ In this step, you'll configure the Postman app and invoke the API using the conf
3131
1. From the **Workspaces** menu, select **Create Workspace** to create a new Workspace called **Microsoft Entra ID Provisioning API**.
3232
1. Download the following Postman collections and save it in your local directory.
3333
- [Entra ID Inbound Provisioning.postman_collection.json](https://github.com/AzureAD/entra-id-inbound-provisioning/blob/main/Postman/Entra%20ID%20Inbound%20Provisioning.postman_collection.json) (Request collection)
34-
- [Test-API2AAD.postman_environment.json](https://github.com/AzureAD/entra-id-inbound-provisioning/blob/main/Postman/Test-API2AAD.postman_environment.json) (Environment collection for API-driven provisioning to on-premises AD)-
34+
- [Test-API2AAD.postman_environment.json](https://github.com/AzureAD/entra-id-inbound-provisioning/blob/main/Postman/Test-API2AAD.postman_environment.json) (Environment collection for API-driven provisioning to Azure AD)-
3535
- [Test-API2AD.postman_environment.json](https://github.com/AzureAD/entra-id-inbound-provisioning/blob/main/Postman/Test-API2AD.postman_environment.json) (Environment collection for API-driven provisioning to on-premises AD)
3636
1. Use the **Import** option in Postman to import both of these files into your Workspace.
3737
:::image type="content" source="media/inbound-provisioning-api-postman/postman-import-elements.png" alt-text="Screenshot of Postman Import elements." lightbox="media/inbound-provisioning-api-postman/postman-import-elements.png":::

articles/active-directory/app-proxy/app-proxy-protect-ndes.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/19/2023
11+
ms.date: 09/13/2023
1212
ms.author: kenwith
1313
---
1414

@@ -28,10 +28,9 @@ Azure AD Application Proxy is built on Azure. It gives you a massive amount of n
2828

2929
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3030

31-
1. Sign in to the [Azure portal](https://portal.azure.com) as an application administrator of the directory that uses Application Proxy. For example, if the tenant domain is contoso.com, the admin should be [email protected] or any other admin alias on that domain.
31+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
3232
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
33-
1. In left navigation panel, select **Azure Active Directory**.
34-
1. Under **Manage**, select **Application proxy**.
33+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
3534
1. Select **Download connector service**.
3635

3736
![Download connector service to see the Terms of Service](./media/app-proxy-protect-ndes/application-proxy-download-connector-service.png)

articles/active-directory/app-proxy/application-proxy-add-on-premises-application.md

Lines changed: 31 additions & 32 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/how-to-authentication-find-coverage-gaps.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,3 +58,7 @@ After your admins are enforced for multifactor authentication and have been usin
5858
- [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview)
5959

6060
You can read more about these authentication methods and their security considerations in [Azure AD authentication methods](concept-authentication-methods.md).
61+
62+
## Next steps
63+
64+
[Enable passwordless sign-in with Microsoft Authenticator](howto-authentication-passwordless-phone.md)

articles/active-directory/authentication/how-to-authentication-methods-manage.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 03/22/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -70,7 +70,10 @@ Record which users are in scope for SSPR (either all users, one specific group,
7070

7171
### Authentication methods policy
7272

73-
To check settings in the Authentication methods policy, sign in as an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator) and go to **Azure Active Directory** > **Security** > **Authentication methods** > **Policies**. A new tenant has all methods **Off** by default, which makes migration easier because legacy policy settings don't need to be merged with existing settings.
73+
To check settings in the Authentication methods policy, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator) and browse to **Protection** > **Authentication methods** > **Policies**. A new tenant has all methods **Off** by default, which makes migration easier because legacy policy settings don't need to be merged with existing settings.
74+
75+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
76+
1. Browse to **Protection** > **Authentication methods** >
7477

7578
:::image type="content" source="media/concept-authentication-methods-manage/authentication-methods-policy.png" alt-text="Screenshot that shows the authentication methods." lightbox="media/concept-authentication-methods-manage/authentication-methods-policy.png":::
7679

articles/active-directory/authentication/how-to-authentication-sms-supported-apps.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
2525
| Microsoft One Note || |
2626
| Microsoft Teams |||
2727
| Company portal |||
28-
| My Apps Portal ||Not available|
28+
| My Apps portal ||Not available|
2929
| Microsoft Forms ||Not available|
3030
| Microsoft Edge || |
3131
| Microsoft Power BI || |
@@ -36,17 +36,17 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
3636

3737
*_SMS sign-in isn't available for office applications, such as Word, Excel, etc., when accessed directly on the web, but is available when accessed through the [Office 365 web app](https://www.office.com)_
3838

39-
The above mentioned Microsoft apps support SMS sign-in is because they use the Microsoft Identity login (`https://login.microsoftonline.com/`), which allows user to enter phone number and SMS code.
39+
The above mentioned Microsoft apps support SMS sign-in is because they use the Microsoft Identity login (`https://login.microsoftonline.com/`), which allows users to enter phone number and SMS code.
4040

4141
## Unsupported Microsoft apps
4242

4343
Microsoft 365 desktop (Windows or Mac) apps and Microsoft 365 web apps (except MS One Note) that are accessed directly on the web don't support SMS sign-in. These apps use the Microsoft Office login (`https://office.live.com/start/*`) that requires a password to sign in.
44-
For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Company Portal, and Microsoft Azure) don't support SMS sign-in.
44+
For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Company portal, and Microsoft Azure) don't support SMS sign-in.
4545

4646
| Unsupported Microsoft apps| Examples |
4747
| --- | --- |
4848
| Native desktop Microsoft apps | Microsoft Teams, O365 apps, Word, Excel, etc.|
49-
| Native mobile Microsoft apps (except Microsoft Teams, Company Portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
49+
| Native mobile Microsoft apps (except Microsoft Teams, Company portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
5050
| Microsoft 365 web apps (accessed directly on web) | [Outlook](https://outlook.live.com/owa/), [Word](https://office.live.com/start/Word.aspx), [Excel](https://office.live.com/start/Excel.aspx), [PowerPoint](https://office.live.com/start/PowerPoint.aspx)|
5151

5252
## Support for Non-Microsoft apps

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Topic that shows how to configure Azure AD certificate-based authen
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: how-to
8-
ms.date: 02/09/2023
8+
ms.date: 09/13/2023
99

1010
ms.author: justinha
1111
author: justinha
@@ -53,16 +53,16 @@ Optionally, you can also configure authentication bindings to map certificates t
5353

5454
## Step 1: Configure the certification authorities
5555

56-
You can configure CAs by using the Azure portal or PowerShell.
56+
You can configure CAs by using the Microsoft Entra admin center or PowerShell.
5757

58-
### Configure certification authorities using the Azure portal
58+
### Configure certification authorities using the Microsoft Entra admin center
5959

6060
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
6161

62-
To enable the certificate-based authentication and configure user bindings in the Azure portal, complete the following steps:
62+
To enable the certificate-based authentication and configure user bindings in the Microsoft Entra admin center, complete the following steps:
6363

64-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
65-
1. Click **Azure Active Directory** > **Security**.
64+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
65+
1. Browse to **Protection** > **Authentication methods** > **Certifacte-based authentication**.
6666

6767
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/certificate-authorities.png" alt-text="Screenshot of certification authorities.":::
6868

@@ -144,11 +144,10 @@ For more information, see [Understanding the certificate revocation process](./c
144144
>[!IMPORTANT]
145145
>A user is considered capable for **MFA** when the user is in scope for **Certificate-based authentication** in the Authentication methods policy. This policy requirement means a user can't use proof up as part of their authentication to register other available methods. If the users do not have access to certificates they will be locked out and not be able to register other methods for MFA. So the admin needs to enable users who have a valid certificate into the CBA scope. Do not use all users for CBA target and use groups of users who have valid certificates available. For more information, see [Azure AD MFA](concept-mfa-howitworks.md).
146146
147-
To enable the certificate-based authentication in the Azure portal, complete the following steps:
147+
To enable the certificate-based authentication in the Microsoft Entra admin center, complete the following steps:
148148

149-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Authentication Policy Administrator.
150-
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
151-
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
149+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
150+
1. Browse to **Protection** > **Authentication methods** > **Certificate-based Authentication**.
152151
1. Under **Enable and Target**, click **Enable**.
153152
1. Click **All users**, or click **Add groups** to select specific groups.
154153

@@ -164,11 +163,10 @@ Once certificate-based authentication is enabled on the tenant, all users in the
164163

165164
The authentication binding policy helps determine the strength of authentication to either a single factor or multi factor. An admin can change the default value from single-factor to multifactor and configure custom policy rules by mapping to issuer Subject or policy OID fields in the certificate.
166165

167-
To enable Azure AD CBA and configure user bindings in the Azure portal, complete the following steps:
166+
To enable Azure AD CBA and configure user bindings in the Microsoft Entra admin center, complete the following steps:
168167

169-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Authentication Policy Administrator.
170-
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
171-
1. Click **Authentication methods** > **Policies**.
168+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
169+
1. Browse to **Protection** > **Authentication methods** > **Policies**.
172170
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
173171

174172
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/policy.png" alt-text="Screenshot of Authentication policy.":::

0 commit comments

Comments
 (0)