Skip to content

Commit f79d9af

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 8400de3 + 505d46e commit f79d9af

File tree

141 files changed

+1155
-753
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

141 files changed

+1155
-753
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22661,6 +22661,11 @@
2266122661
"redirect_URL": "/azure/route-server/tutorial-protect-route-server-ddos",
2266222662
"redirect_document_id": false
2266322663
},
22664+
{
22665+
"source_path": "articles/external-attack-surface-management/data-connections-overview.md",
22666+
"redirect_URL": "/azure/external-attack-surface-management/index",
22667+
"redirect_document_id": true
22668+
},
2266422669
{
2266522670
"source_path": "articles/virtual-network/nat-gateway/tutorial-protect-nat-gateway.md",
2266622671
"redirect_URL": "/azure/virtual-network/nat-gateway/tutorial-protect-nat-gateway-ddos",

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ sections:
123123
How can I use single-factor certificates to complete MFA?
124124
answer: |
125125
We have support for single factor CBA to get MFA. CBA SF + PSI (passwordless phone sign in) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
126-
[MFA with single factor certificates](../authentication/concept-certificate-based-authentication-technical-deep-dive.md#single-factor-certificate-based-authentication)
126+
[MFA with single factor certificates](../authentication/concept-certificate-based-authentication-technical-deep-dive.md#mfa-authentication-flow-using-single-factor-certificates-and-passwordless-sign-in)
127127
128128
- question: |
129129
Will the changes to the Authentication methods policy take effect immediately?

articles/active-directory/authentication/concept-certificate-based-authentication-migration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,9 @@ To configure Staged Rollout, follow these steps:
3939

4040
For more information, see [Staged Rollout](../hybrid/how-to-connect-staged-rollout.md).
4141

42+
>[!NOTE]
43+
> When Staged rollout is enabled for a user, the user is considered a managed user and all authentication will happen at Azure AD. For a federated Tenant, if CBA is enabled on Staged Rollout, password authentication only works if PHS is enabled too otherwise password authentication will fail.
44+
4245
## Use Azure AD connect to update certificateUserIds attribute
4346

4447
An AD FS admin can use **Synchronization Rules Editor** to create rules to sync the values of attributes from AD FS to Azure AD user objects. For more information, see [Sync rules for certificateUserIds](concept-certificate-based-authentication-certificateuserids.md#update-certificate-user-ids-using-azure-ad-connect).

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,10 @@ Now we'll walk through each step:
7474

7575
## MFA with Single-factor certificate-based authentication
7676

77-
Azure AD CBA supports second factors to meet MFA requirements with single-factor certificates. Users can use either passwordless sign-in or FIDO2 security keys as second factors when the first factor is single-factor CBA. Users need to register passwordless sign-in or FIDO2 in advance to signing in with Azure AD CBA.
77+
Azure AD CBA supports second factors to meet MFA requirements with single-factor certificates. Users can use either passwordless sign-in or FIDO2 security keys as second factors when the first factor is single-factor CBA. Users need to have another way to get MFA and register passwordless sign-in or FIDO2 in advance to signing in with Azure AD CBA.
78+
79+
>[!IMPORTANT]
80+
>A user will be considered MFA capable when a user is in scope for Certificate-based authentication auth method. This means user will not be able to use proof up as part of their authentication to registerd other available methods. More info on [Azure AD MFA](../authentication/concept-mfa-howitworks.md)
7881
7982
**Steps to set up passwordless phone signin(PSI) with CBA**
8083

articles/active-directory/manage-apps/datawiza-azure-ad-sso-mfa-oracle-ebs.md

Lines changed: 84 additions & 89 deletions
Large diffs are not rendered by default.

articles/active-directory/managed-identities-azure-resources/how-to-assign-managed-identity-via-azure-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Use Azure Policy to assign managed identities (preview)
33
description: Documentation for the Azure Policy that can be used to assign managed identities to Azure resources.
44
services: active-directory
5-
author: karavar
6-
manager: skwan
5+
author: barclayn
6+
manager: amycolannino
77
editor: barclayn
88
ms.service: active-directory
99
ms.subservice: msi
1010
ms.topic: how-to
1111
ms.workload: identity
1212
ms.date: 05/23/2022
13-
ms.author: vakarand
13+
ms.author: barclayn
1414
ms.collection: M365-identity-device-management
1515
---
1616

articles/active-directory/managed-identities-azure-resources/known-issues.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,6 @@ For more information, see [Transfer an Azure subscription to a different Azure A
5959
In rare cases, you may see error messages indicating errors related to assignment of managed identities with Azure resources. Some of the example error messages are as follows:
6060
- Azure resource ‘azure-resource-id' does not have access to identity 'managed-identity-id'.
6161
- No managed service identities are associated with resource ‘azure-resource-id'
62-
- Managed service identities referenced with URL 'https://control-....virtualMachineScaleSets/<vmss_name>/credentials/v2/systemassigned' are not valid. Ensure all assigned identities associated with the resource are valid.
6362

6463
**Workaround**
6564
In these rare cases the best next steps are
@@ -68,6 +67,12 @@ In these rare cases the best next steps are
6867
2. For User Assigned Managed Identity, reassign the identity to the Azure resource.
6968
3. For System Assigned Managed Identity, disable the identity and enable it again.
7069

70+
>[!NOTE]
71+
>To assign/unassign Managed identities please follow below links
72+
73+
- [Documentation for VM](qs-configure-portal-windows-vm.md)
74+
- [Documentation for VMSS](qs-configure-portal-windows-vmss.md)
75+
7176
## Next steps
7277

7378
You can review our article listing the [services that support managed identities](services-support-managed-identities.md) and our [frequently asked questions](managed-identities-faq.md)

articles/azure-app-configuration/powershell-samples.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: PowerShell samples
33
description: Learn about the Azure PowerShell sample scripts available for App Configuration.
44
ms.service: azure-app-configuration
55
ms.topic: sample
6-
ms.date: 12/14/2022
6+
ms.date: 01/19/2023
77
ms.author: malev
88
author: maud-lv
99
---
@@ -14,9 +14,9 @@ The following table includes links to PowerShell scripts built using the [Az.App
1414
| Script | Description |
1515
|-|-|
1616
|**Create store**||
17-
| [Create a configuration store with the specified parameters](/powershell/module/az.appconfiguration/New-AzAppConfigurationStore) | Creates an Azure App Configuration store with some specified parameters. |
17+
| [Create a configuration store with the specified parameters](scripts/powershell-create-service.md) | Creates an Azure App Configuration store with some specified parameters. |
1818
|**Delete store**||
19-
| [Delete a configuration store](/powershell/module/az.appconfiguration/Remove-AzAppConfigurationStore) | Deletes an Azure App Configuration store. |
19+
| [Delete a configuration store](scripts/powershell-delete-service.md) | Deletes an Azure App Configuration store. |
2020
| [Purge a deleted configuration store](/powershell/module/az.appconfiguration/Clear-AzAppConfigurationDeletedStore) | Purges a deleted Azure App Configuration store, permanently removing all data. |
2121
|**Get and list stores**||
2222
| [Get a deleted configuration store](/powershell/module/az.appconfiguration/Get-AzAppConfigurationDeletedStore) | Gets a deleted Azure App Configuration store. |

articles/azure-app-configuration/scripts/cli-create-service.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,20 +7,20 @@ author: maud-lv
77

88
ms.service: azure-app-configuration
99
ms.topic: sample
10-
ms.date: 01/24/2020
10+
ms.date: 01/18/2023
1111
ms.author: malev
1212
ms.custom: devx-track-azurecli
1313
---
1414

15-
# Create an Azure App Configuration Store
15+
# Create an Azure App Configuration store with the Azure CLI
1616

17-
This sample script creates a new instance of Azure App Configuration in a new resource group.
17+
This sample script creates a new instance of Azure App Configuration using the Azure CLI in a new resource group.
1818

1919
[!INCLUDE [quickstarts-free-trial-note](../../../includes/quickstarts-free-trial-note.md)]
2020

2121
[!INCLUDE [azure-cli-prepare-your-environment.md](~/articles/reusable-content/azure-cli/azure-cli-prepare-your-environment.md)]
2222

23-
- This tutorial requires version 2.0 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.
23+
- This tutorial requires version 2.0 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.
2424

2525
## Sample script
2626

@@ -55,7 +55,7 @@ appConfigConnectionString=$(az appconfig credential list \
5555
echo "$appConfigConnectionString"
5656
```
5757

58-
Make a note of the actual name generated for the new resource group. You will use that resource group name when you want to delete all group resources.
58+
Make a note of the actual name generated for the new resource group. You'll use that resource group name when you want to delete all group resources.
5959

6060
[!INCLUDE [cli-script-cleanup](../../../includes/cli-script-clean-up.md)]
6161

@@ -73,4 +73,4 @@ This script uses the following commands to create a new resource group and an Ap
7373

7474
For more information on the Azure CLI, see [Azure CLI documentation](/cli/azure).
7575

76-
Additional App Configuration CLI script samples can be found in the [Azure App Configuration CLI samples](../cli-samples.md).
76+
More App Configuration CLI script samples can be found in the [Azure App Configuration CLI samples](../cli-samples.md).

articles/azure-app-configuration/scripts/cli-delete-service.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,9 @@ ms.author: malev
1313
ms.custom: devx-track-azurecli
1414
---
1515

16-
# Delete an Azure App Configuration store
16+
# Delete an Azure App Configuration store with the Azure CLI
1717

18-
This sample script deletes an instance of Azure App Configuration.
18+
This sample script deletes an instance of Azure App Configuration using the Azure CLI.
1919

2020
[!INCLUDE [quickstarts-free-trial-note](../../../includes/quickstarts-free-trial-note.md)]
2121

0 commit comments

Comments
 (0)