Skip to content

Commit f72b256

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into image-tutorial
2 parents f9be0f9 + 5b9102c commit f72b256

File tree

1,043 files changed

+10737
-9575
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,043 files changed

+10737
-9575
lines changed

.openpublishing.redirection.json

Lines changed: 393 additions & 322 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -273,10 +273,11 @@ Inspect the `B2CGraphClient.SendGraphPatchRequest()` method for details on how t
273273

274274
### Search users
275275

276-
You can search for users in your B2C tenant in two ways:
276+
You can search for users in your B2C tenant in the following ways:
277277

278278
* Reference the user's **object ID**.
279279
* Reference their sign-in identifer, the `signInNames` property.
280+
* Reference any of the valid OData parameters. For example, 'givenName', 'surname', 'displayName' etc.
280281

281282
Run one of the following commands to search for a user:
282283

@@ -290,6 +291,9 @@ For example:
290291
```cmd
291292
B2C Get-User 2bcf1067-90b6-4253-9991-7f16449c2d91
292293
B2C Get-User $filter=signInNames/any(x:x/value%20eq%20%27consumer@fabrikam.com%27)
294+
B2C get-user $filter=givenName%20eq%20%27John%27
295+
B2C get-user $filter=surname%20eq%20%27Doe%27
296+
B2C get-user $filter=displayName%20eq%20%27John%20Doe%27
293297
```
294298

295299
### Delete users

articles/active-directory-domain-services/faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The service itself doesn't directly support this scenario. Your managed domain i
5858
Yes. For more information, see [how to enable Azure AD Domain Services using PowerShell](powershell-create-instance.md).
5959

6060
### Can I enable Azure AD Domain Services using a Resource Manager Template?
61-
No, it's not currently possible to enable Azure AD Domain Services using a template. For a scripted approach, see [how to enable Azure AD Domain Services using PowerShell](powershell-create-instance.md).
61+
Yes, you can create an Azure AD Domain Services managed domain using a Resource Manager template. A service principal and Azure AD group for administration must be created using the Azure portal or Azure PowerShell before the template is deployed. When you create an Azure AD Domain Services managed domain in the Azure portal, there's an option to export the template for use with additional deployments. There's also an [example template in the GitHub templates sample repo](https://github.com/Azure/azure-quickstart-templates/tree/master/101-AAD-DomainServices).
6262

6363
### Can I add domain controllers to an Azure AD Domain Services managed domain?
6464
No. The domain provided by Azure AD Domain Services is a managed domain. You don't need to provision, configure, or otherwise manage domain controllers for this domain. These management activities are provided as a service by Microsoft. Therefore, you can't add additional domain controllers (read-write or read-only) for the managed domain.

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ The following providers offer FIDO2 security keys of different form factors that
7272
| Feitian | [https://www.ftsafe.com/about/Contact_Us](https://www.ftsafe.com/about/Contact_Us) |
7373
| HID | [https://www.hidglobal.com/contact-us](https://www.hidglobal.com/contact-us) |
7474
| Ensurity | [https://www.ensurity.com/contact](https://www.ensurity.com/contact) |
75-
| eWBM | [https://www.ewbm.com/page/sub1_5](https://www.ewbm.com/page/sub1_5) |
75+
| eWBM | [https://www.ewbm.com/support](https://www.ewbm.com/support) |
7676
| AuthenTrend | [https://authentrend.com/about-us/#pg-35-3](https://authentrend.com/about-us/#pg-35-3) |
7777

7878
> [!NOTE]

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ To target specific device groups to enable the credential provider, use the foll
8585

8686
### Enable with a provisioning package
8787

88-
For devices not managed by Intune, a provisioning package can be installed to enable the functionality. The Windows Configuration Designer app can be installed from the [Microsoft Store](https://www.microsoft.com/store/apps/9nblggh4tx22).
88+
For devices not managed by Intune, a provisioning package can be installed to enable the functionality. The Windows Configuration Designer app can be installed from the [Microsoft Store](https://www.microsoft.com/en-us/p/windows-configuration-designer/9nblggh4tx22).
8989

9090
1. Launch the Windows Configuration Designer.
9191
1. Select **File** > **New project**.

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,9 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Deploy Azure AD self-service password reset
1919

20+
> [!NOTE]
21+
> This guide explains self-service password reset and how to deploy it. If you are looking for the self service password reset tool to get back into your account, go to [https://aka.ms/sspr](https://aka.ms/sspr).
22+
2023
Self-service password reset (SSPR) is an Azure Active Directory feature that enables employees to reset their passwords without needing to contact IT staff. Employees must register for or be registered for self-service password reset before using the service. During registration, the employee chooses one or more authentication methods enabled by their organization.
2124

2225
SSPR enables employees to quickly get unblocked and continue working no matter where they are or the time of day. By allowing users to unblock themselves, your organization can reduce the non-productive time and high support costs for most common password-related issues.

articles/active-directory/authentication/multi-factor-authentication-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ A workaround for this error is to have separate user accounts for admin-related
216216

217217
If your question isn't answered here, please leave it in the comments at the bottom of the page. Or, here are some additional options for getting help:
218218

219-
* Search the [Microsoft Support Knowledge Base](https://www.microsoft.com/en-us/search?form=mssupport&q=phonefactor&rtc=1) for solutions to common technical issues.
219+
* Search the [Microsoft Support Knowledge Base](https://support.microsoft.com) for solutions to common technical issues.
220220
* Search for and browse technical questions and answers from the community, or ask your own question in the [Azure Active Directory forums](https://social.msdn.microsoft.com/Forums/azure/newthread?category=windowsazureplatform&forum=WindowsAzureAD&prof=required).
221221
* If you're a legacy PhoneFactor customer and you have questions or need help resetting a password, use the [password reset](mailto:[email protected]) link to open a support case.
222222
* Contact a support professional through [Azure Multi-Factor Authentication Server (PhoneFactor) support](https://support.microsoft.com/oas/default.aspx?prid=14947). When contacting us, it's helpful if you can include as much information about your issue as possible. Information you can supply includes the page where you saw the error, the specific error code, the specific session ID, and the ID of the user who saw the error.

articles/active-directory/develop/quickstart-configure-app-access-web-apis.md

Lines changed: 28 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,14 +168,41 @@ To add a credential to your web application:
168168
To add permission(s) to access resource APIs from your client:
169169

170170
1. From the app's **Overview** page, select **API permissions**.
171-
1. Select the **Add a permission** button.
171+
1. Under the **Configured permissions** section, select the **Add a permission** button.
172172
1. By default, the view allows you to select from **Microsoft APIs**. Select the section of APIs that you're interested in:
173173
* **Microsoft APIs** - Lets you select permissions for Microsoft APIs such as Microsoft Graph.
174174
* **APIs my organization uses** - Lets you select permissions for APIs that have been exposed by your organization, or APIs that your organization has integrated with.
175175
* **My APIs** - Lets you select permissions for APIs that you have exposed.
176176
1. Once you've selected the APIs, you'll see the **Request API Permissions** page. If the API exposes both delegated and application permissions, select which type of permission your application needs.
177177
1. When finished, select **Add permissions**. You will return to the **API permissions** page, where the permissions have been saved and added to the table.
178178

179+
## Understanding API permissions and admin consent UI
180+
181+
### Configured permissions
182+
183+
This section shows the permissions that have been explicitly configured on the application object (\the permissions that are part of the app's required resource access list). You may add or remove permissions from this table. As an admin, you can also grant/revoke admin consent for a set of an API's permissions or individual permissions in this section.
184+
185+
### Other permissions granted
186+
187+
If your application is registered in a tenant, you may see an additional section titled **Other permissions granted for Tenant**. This section shows permissions that have been granted for the tenant but have not been explicitly configured on the application object (e.g. permissions that were dynamically requested and consented). This section only appears if there is at least one permission that applies.
188+
189+
You may add a set of an API's permissions or individual permissions that appear in this section to the **Configured permissions** section. As an admin, you can also revoke admin consent for individual APIs or permissions in this section.
190+
191+
### Admin consent button
192+
193+
If your application is registered in a tenant, you will see a **Grant admin consent for Tenant** button. It will be disabled if you are not an admin, or if no permissions have been configured for the application.
194+
This button allows an admin to easily grant admin consent to the permissions configured for the application. Clicking the admin consent button launches a new window with a consent prompt showing all the configured permissions.
195+
196+
> [!NOTE]
197+
> There is a delay between permissions being configured for the application and them appearing on the consent prompt. If you do not see all the configured permissions in the consent prompt, close it and launch it again.
198+
199+
If you have permissions that have been granted but not configured, when clicking the admin consent button you will be prompted to decide how to handle these permissions. You may add them to configured permissions or you may remove them.
200+
201+
The consent prompt provides the option to **Accept** or **Cancel**. If you select **Accept**, admin consent is granted. If you select **Cancel**, admin consent is not granted, and you will see an error stating that consent has been declined.
202+
203+
> [!NOTE]
204+
> There is a delay between granting admin consent (selecting **Accept** on the consent prompt) and the status of admin consent being reflected in the UI.
205+
179206
## Next steps
180207

181208
Learn about these other related app management quickstarts for apps:

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ The What's new in Azure Active Directory? release notes provide information abou
4040

4141
Azure AD threat intelligence detection is now available as part of the updated Azure AD Identity Protection feature. This new functionality helps to indicate unusual user activity for a specific user or activity that’s consistent with known attack patterns based on Microsoft’s internal and external threat intelligence sources.
4242

43-
For more information about the refreshed version of Azure AD Identity Protection, see the [Four major Azure AD Identity Protection enhancements are now in public preview](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Four-major-Azure-AD-Identity-Protection-enhancements-are-now-in/ba-p/326935) blog and the [What is Azure Active Directory Identity Protection (refreshed)?](https://docs.microsoft.com/azure/active-directory/identity-protection/overview-v2) article. For more information about Azure AD threat intelligence detection, see the [Azure Active Directory Identity Protection risk detections](https://docs.microsoft.com/azure/active-directory/identity-protection/risk-events-reference#azure-ad-threat-intelligence) article.
43+
For more information about the refreshed version of Azure AD Identity Protection, see the [Four major Azure AD Identity Protection enhancements are now in public preview](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Four-major-Azure-AD-Identity-Protection-enhancements-are-now-in/ba-p/326935) blog and the [What is Azure Active Directory Identity Protection (refreshed)?](https://docs.microsoft.com/azure/active-directory/identity-protection/overview-v2) article. For more information about Azure AD threat intelligence detection, see the [Azure Active Directory Identity Protection risk detections](https://docs.microsoft.com/azure/active-directory/identity-protection/concept-identity-protection-risks) article.
4444

4545
---
4646

articles/active-directory/hybrid/how-to-connect-install-custom.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.assetid: 6d42fb79-d9cf-48da-8445-f482c4c536af
1010
ms.service: active-directory
1111
ms.workload: identity
1212
ms.topic: conceptual
13-
ms.date: 09/25/2019
13+
ms.date: 11/14/2019
1414
ms.subservice: hybrid
1515
ms.author: billmath
1616
ms.collection: M365-identity-device-management
@@ -82,7 +82,9 @@ After entering the forest name and clicking **Add Directory**, a pop-up dialog
8282
![Connect Directory](./media/how-to-connect-install-custom/connectdir02.png)
8383

8484
#### Enterprise Admin and Domain Admin accounts not supported
85-
As of build 1.4.###.# it is no longer supported to use an Enterprise Admin or a Domain Admin account as the AD DS Connector account. If you attempt to enter an account that is an enterprise admin or domain admin when specifying **use existing account**, you will receive an error.
85+
As of build 1.4.18.0 it is no longer supported to use an Enterprise Admin or a Domain Admin account as the AD DS Connector account. If you attempt to enter an account that is an enterprise admin or domain admin when specifying **use existing account**, you will receive the following error:
86+
87+
**“Using an Enterprise or Domain administrator account for your AD forest account is not allowed. Let Azure AD Connect create the account for you or specify a synchronization account with the correct permissions. <Learn More>**
8688

8789
### Azure AD sign-in configuration
8890
This page allows you to review the UPN domains present in on-premises AD DS and which have been verified in Azure AD. This page also allows you to configure the attribute to use for the userPrincipalName.

0 commit comments

Comments
 (0)