Skip to content

Commit f71f1fd

Browse files
authored
Merge pull request #210690 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 38714fb + bba26ab commit f71f1fd

File tree

7 files changed

+28
-20
lines changed

7 files changed

+28
-20
lines changed

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -151,6 +151,8 @@ The following client apps are confirmed to support this setting:
151151
- Microsoft Teams
152152
- Microsoft To Do
153153
- Microsoft Word
154+
- Microsoft Power Apps
155+
- Microsoft Field Service (Dynamics 365)
154156
- MultiLine for Intune
155157
- Nine Mail - Email and Calendar
156158
- Notate for Intune

articles/active-directory/conditional-access/concept-conditional-access-policies.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -36,14 +36,14 @@ All policies are enforced in two phases:
3636
- Use the session details gathered in phase 1 to identify any requirements that haven't been met.
3737
- If there's a policy that is configured to block access, with the block grant control, enforcement will stop here and the user will be blocked.
3838
- The user will be prompted to complete more grant control requirements that weren't satisfied during phase 1 in the following order, until policy is satisfied:
39-
- [Multi-factor authentication​](concept-conditional-access-grant.md#require-multi-factor-authentication)
40-
- [Device to be marked as compliant](./concept-conditional-access-grant.md#require-device-to-be-marked-as-compliant)
41-
- [Hybrid Azure AD joined device](./concept-conditional-access-grant.md#require-hybrid-azure-ad-joined-device)
42-
- [Approved client app](./concept-conditional-access-grant.md#require-approved-client-app)
43-
- [App protection policy](./concept-conditional-access-grant.md#require-app-protection-policy)
44-
- [Password change](./concept-conditional-access-grant.md#require-password-change)
45-
- [Terms of use](concept-conditional-access-grant.md#terms-of-use)
46-
- [Custom controls](./concept-conditional-access-grant.md#custom-controls-preview)
39+
1. [Multi-factor authentication​](concept-conditional-access-grant.md#require-multi-factor-authentication)
40+
2. [Device to be marked as compliant](./concept-conditional-access-grant.md#require-device-to-be-marked-as-compliant)
41+
3. [Hybrid Azure AD joined device](./concept-conditional-access-grant.md#require-hybrid-azure-ad-joined-device)
42+
4. [Approved client app](./concept-conditional-access-grant.md#require-approved-client-app)
43+
5. [App protection policy](./concept-conditional-access-grant.md#require-app-protection-policy)
44+
6. [Password change](./concept-conditional-access-grant.md#require-password-change)
45+
7. [Terms of use](concept-conditional-access-grant.md#terms-of-use)
46+
8. [Custom controls](./concept-conditional-access-grant.md#custom-controls-preview)
4747
- Once all grant controls have been satisfied, apply session controls (App Enforced, Microsoft Defender for Cloud Apps, and token Lifetime)
4848
- Phase 2 of policy evaluation occurs for all enabled policies.
4949

articles/active-directory/devices/concept-primary-refresh-token.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ The following diagrams illustrate the underlying details in issuing, renewing, a
159159
| :---: | --- |
160160
| A | User enters their password in the sign in UI. LogonUI passes the credentials in an auth buffer to LSA, which in turns passes it internally to CloudAP. CloudAP forwards this request to the CloudAP plugin. |
161161
| B | CloudAP plugin initiates a realm discovery request to identify the identity provider for the user. If user’s tenant has a federation provider setup, Azure AD returns the federation provider’s Metadata Exchange endpoint (MEX) endpoint. If not, Azure AD returns that the user is managed indicating that user can authenticate with Azure AD. |
162-
| C | If the user is managed, CloudAP will get the nonce from Azure AD. If the user is federated, CloudAP plugin requests a SAML token from the federation provider with the user’s credentials. Once it receives, the SAML token, it requests a nonce from Azure AD. |
162+
| C | If the user is managed, CloudAP will get the nonce from Azure AD. If the user is federated, CloudAP plugin requests a SAML token from the federation provider with the user’s credentials. Nonce is requested before the SAML token is sent to Azure AD. |
163163
| D | CloudAP plugin constructs the authentication request with the user’s credentials, nonce, and a broker scope, signs the request with the Device key (dkpriv) and sends it to Azure AD. In a federated environment, CloudAP plugin uses the SAML token returned by the federation provider instead of the user’ credentials. |
164164
| E | Azure AD validates the user credentials, the nonce, and device signature, verifies that the device is valid in the tenant and issues the encrypted PRT. Along with the PRT, Azure AD also issues a symmetric key, called the Session key encrypted by Azure AD using the Transport key (tkpub). In addition, the Session key is also embedded in the PRT. This Session key acts as the Proof-of-possession (PoP) key for subsequent requests with the PRT. |
165165
| F | CloudAP plugin passes the encrypted PRT and Session key to CloudAP. CloudAP request the TPM to decrypt the Session key using the Transport key (tkpriv) and re-encrypt it using the TPM’s own key. CloudAP stores the encrypted Session key in its cache along with the PRT. |
@@ -173,7 +173,7 @@ The following diagrams illustrate the underlying details in issuing, renewing, a
173173
| A | User enters their password in the sign in UI. LogonUI passes the credentials in an auth buffer to LSA, which in turns passes it internally to CloudAP. CloudAP forwards this request to the CloudAP plugin. |
174174
| B | If the user has previously logged on to the user, Windows initiates cached sign in and validates credentials to log the user in. Every 4 hours, the CloudAP plugin initiates PRT renewal asynchronously. |
175175
| C | CloudAP plugin initiates a realm discovery request to identify the identity provider for the user. If user’s tenant has a federation provider setup, Azure AD returns the federation provider’s Metadata Exchange endpoint (MEX) endpoint. If not, Azure AD returns that the user is managed indicating that user can authenticate with Azure AD. |
176-
| D | If the user is federated, CloudAP plugin requests a SAML token from the federation provider with the user’s credentials. Once it receives, the SAML token, it requests a nonce from Azure AD. If the user is managed, CloudAP will directly get the nonce from Azure AD. |
176+
| D | If the user is federated, CloudAP plugin requests a SAML token from the federation provider with the user’s credentials. Nonce is requested before the SAML token is sent to Azure AD. If the user is managed, CloudAP will directly get the nonce from Azure AD. |
177177
| E | CloudAP plugin constructs the authentication request with the user’s credentials, nonce, and the existing PRT, signs the request with the Session key and sends it to Azure AD. In a federated environment, CloudAP plugin uses the SAML token returned by the federation provider instead of the user’ credentials. |
178178
| F | Azure AD validates the Session key signature by comparing it against the Session key embedded in the PRT, validates the nonce and verifies that the device is valid in the tenant and issues a new PRT. As seen before, the PRT is again accompanied with the Session key encrypted by Transport key (tkpub). |
179179
| G | CloudAP plugin passes the encrypted PRT and Session key to CloudAP. CloudAP requests the TPM to decrypt the Session key using the Transport key (tkpriv) and re-encrypt it using the TPM’s own key. CloudAP stores the encrypted Session key in its cache along with the PRT. |

articles/active-directory/verifiable-credentials/partner-gallery.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,12 +22,14 @@ To be considered into Entra Verified ID partner documentation, submit your appli
2222
|:-------------------------|:--------------|:--------------|
2323
|![Screenshot of au10tix logo.](media/partner-gallery/au10tix.png) | [AU10TIX](https://www.au10tix.com/solutions/microsoft-azure-active-directory-verifiable-credentials-program) improves Verifiability While Protecting Privacy For Businesses, Employees, Contractors, Vendors, And Customers. | [Configure Verified ID by AU10TIX as your Identity Verification Partner](https://aka.ms/au10tixvc). |
2424
| ![Screenshot of a LexisNexis logo.](media/partner-gallery/lexisnexis.png) | [LexisNexis](https://solutions.risk.lexisnexis.com/did-microsoft) risk solutions Verifiable credentials enables faster onboarding for employees, students, citizens, or others to access services. | [Configure Verified ID by LexisNexis Risk Solutions as your Identity Verification Partner](https://aka.ms/lexisnexisvc). |
25-
| ![Screenshot of a Onfido logo.](media/partner-gallery/onfido.jpeg) | [Onfido](https://onfido.com/landing/onfido-microsoft-idv-service/) Start issuing and accepting verifiable credentials in minutes. With verifiable credentials and Onfido you can verify a person’s identity while respecting privacy. Digitally validate information on a person’s ID or their biometrics.| Not Available |
26-
| ![Screenshot of a Vu logo.](media/partner-gallery/vu.png) | [Vu Security](https://landings.vusecurity.com/microsoft-verifiable-credentials) Verifiable credentials with just a selfie and your ID.| Not Available |
27-
| ![Screenshot of a Jumio logo.](media/partner-gallery/jumio.jpeg) | [Jumio](https://www.jumio.com/microsoft-verifiable-credentials/) is helping to support a new form of digital identity by Microsoft based on verifiable credentials and decentralized identifiers standards to let consumers verify once and use everywhere.| Not Available |
28-
| ![Screenshot of a Idemia logo.](media/partner-gallery/idemia.png) | [Idemia](https://na.idemia.com/identity/verifiable-credentials/) Integration with Verified ID enables “Verify once, use everywhere” functionality.| Not Available |
29-
| ![Screenshot of a Acuant logo.](media/partner-gallery/acuant.png) | [Acuant](https://www.acuant.com/microsoft-acuant-verifiable-credentials-my-digital-id/) - My Digital ID - Create Your Digital Identity Once, Use It Everywhere.| Not Available |
30-
| ![Screenshot of a Clear logo.](media/partner-gallery/clear.jpeg) | [Clear](https://ir.clearme.com/news-events/press-releases/detail/25/clear-collaborates-with-microsoft-to-create-more-secure) Collaborates with Microsoft to Create More Secure Digital Experience Through Verification Credential.| Not Available |
25+
| ![Screenshot of a Onfido logo.](media/partner-gallery/onfido.jpeg) | [Onfido](https://onfido.com/landing/onfido-microsoft-idv-service/) Start issuing and accepting verifiable credentials in minutes. With verifiable credentials and Onfido you can verify a person’s identity while respecting privacy. Digitally validate information on a person’s ID or their biometrics.| * |
26+
| ![Screenshot of a Vu logo.](media/partner-gallery/vu.png) | [Vu Security](https://landings.vusecurity.com/microsoft-verifiable-credentials) Verifiable credentials with just a selfie and your ID.| * |
27+
| ![Screenshot of a Jumio logo.](media/partner-gallery/jumio.jpeg) | [Jumio](https://www.jumio.com/microsoft-verifiable-credentials/) is helping to support a new form of digital identity by Microsoft based on verifiable credentials and decentralized identifiers standards to let consumers verify once and use everywhere.| * |
28+
| ![Screenshot of a Idemia logo.](media/partner-gallery/idemia.png) | [Idemia](https://na.idemia.com/identity/verifiable-credentials/) Integration with Verified ID enables “Verify once, use everywhere” functionality.| * |
29+
| ![Screenshot of a Acuant logo.](media/partner-gallery/acuant.png) | [Acuant](https://www.acuant.com/microsoft-acuant-verifiable-credentials-my-digital-id/) - My Digital ID - Create Your Digital Identity Once, Use It Everywhere.| * |
30+
| ![Screenshot of a Clear logo.](media/partner-gallery/clear.jpeg) | [Clear](https://ir.clearme.com/news-events/press-releases/detail/25/clear-collaborates-with-microsoft-to-create-more-secure) Collaborates with Microsoft to Create More Secure Digital Experience Through Verification Credential.| * |
31+
32+
\* - no documentation available yet
3133

3234
## Next steps
3335

articles/azure-arc/data/includes/azure-arc-data-preview-release.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ The current preview release published on September 6, 2022.
2525
New for this release:
2626

2727
- Arc data controller
28-
- New extensions to monitoring stack to enable Kafka as a data cache and expose an OpenTelemetry endpoint for integration. See documentation for more details.
28+
- New extensions to monitoring stack to allow integration of Arc telemetry data feeds with external monitoring solutions. See documentation for more details.
2929
- Deleting an AD connector that is in use is now blocked. First remove all database instances that are using it and then remove the AD connector.
3030

3131
- Arc-enabled SQL managed instance

articles/logic-apps/call-from-power-automate-power-apps.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,11 @@ If you want to migrate your flow from Power Automate or Power to Logic Apps inst
3232

3333
* A Power Automate or Power Apps license.
3434

35-
* A logic app with a request trigger to export.
35+
* A Consumption logic app workflow with a request trigger to export.
36+
37+
> [!NOTE]
38+
>
39+
> The Export capability is available only for Consumption logic app workflows in multi-tenant Azure Logic Apps.
3640
3741
* A flow in Power Automate or Power Apps from which you want to call your logic app.
3842

articles/security/develop/security-code-analysis-faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ sections:
2525
- name: General FAQ
2626
questions:
2727
- question: |
28-
Can I install the extension on my Visual Studio Team Foundation Server instance instead of on an Azure DevOps instance?
28+
Can I install the extension on my Azure DevOps Server (formerly Visual Studio Team Foundation Server) instance instead of on an Azure DevOps instance?
2929
answer: |
30-
No. The extension isn't available for downloading and installation for Visual Studio Team Foundation Server.
30+
No. The extension isn't available for downloading and installation for Azure DevOps Server (formerly Visual Studio Team Foundation Server).
3131
3232
- question: |
3333
Do I have to run Microsoft Security Code Analysis with my build?

0 commit comments

Comments
 (0)