Skip to content

Commit fa2cd5b

Browse files
committed
resolve merge conflict
2 parents 2f2a8ef + 02453da commit fa2cd5b

File tree

532 files changed

+4666
-2976
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

532 files changed

+4666
-2976
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1942,8 +1942,8 @@
19421942
},
19431943
{
19441944
"source_path_from_root": "/articles/active-directory/active-directory-b2b-add-user-without-invite.md",
1945-
"redirect_url": "/azure/active-directory/b2b/add-user-without-invite",
1946-
"redirect_document_id": true
1945+
"redirect_url": "/azure/active-directory/external-identities/redemption-experience",
1946+
"redirect_document_id": false
19471947
},
19481948
{
19491949
"source_path_from_root": "/articles/active-directory/active-directory-b2b-allow-deny-list.md",
@@ -3908,8 +3908,8 @@
39083908
},
39093909
{
39103910
"source_path_from_root": "/articles/active-directory/b2b/add-user-without-invite.md",
3911-
"redirect_url": "/azure/active-directory/external-identities/add-user-without-invite",
3912-
"redirect_document_id": true
3911+
"redirect_url": "/azure/active-directory/external-identities/redemption-experience",
3912+
"redirect_document_id": false
39133913
},
39143914
{
39153915
"source_path_from_root": "/articles/active-directory/b2b/allow-deny-list.md",
@@ -4089,7 +4089,7 @@
40894089
{
40904090
"source_path_from_root": "/articles/active-directory/b2b/redemption-experience.md",
40914091
"redirect_url": "/azure/active-directory/external-identities/redemption-experience",
4092-
"redirect_document_id": true
4092+
"redirect_document_id": false
40934093
},
40944094
{
40954095
"source_path_from_root": "/articles/active-directory/b2b/self-service-portal.md",

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1163,6 +1163,11 @@
11631163
"redirect_url": "/azure",
11641164
"redirect_document_id": false
11651165
},
1166+
{
1167+
"source_path_from_root": "/articles/active-directory/external-identities/add-user-without-invite.md",
1168+
"redirect_url": "/azure/active-directory/external-identities/redemption-experience",
1169+
"redirect_document_id": true
1170+
},
11661171
{
11671172
"source_path_from_root": "/articles/active-directory-b2c/active-directory-b2c-landing-custom.md",
11681173
"redirect_url": "/azure/active-directory-b2c",
@@ -27839,6 +27844,11 @@
2783927844
"redirect_url": "/azure/virtual-machines/workloads/sap/deployment-checklist",
2784027845
"redirect_document_id": false
2784127846
},
27847+
{
27848+
"source_path_from_root": "/articles/virtual-machines/workloads/sap/sap-get-started-classic.md",
27849+
"redirect_url": "/azure/virtual-machines/workloads/sap/get-started",
27850+
"redirect_document_id": false
27851+
},
2784227852
{
2784327853
"source_path_from_root": "/articles/migrate/how-to-scale-assessment.md",
2784427854
"redirect_url": "scale-hyper-v-assessment",

articles/active-directory-b2c/configure-authentication-sample-ios-app.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 07/29/2021
10+
ms.date: 01/06/2023
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -110,10 +110,10 @@ This sample acquires an access token with the relevant scopes that the mobile ap
110110
111111
## Step 4: Get the iOS mobile app sample
112112

113-
1. [Download the .zip file](https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal/archive/refs/heads/vNext.zip), or clone the sample web app from the [GitHub repo](https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal).
113+
1. [Download the .zip file](https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal/archive/refs/heads/master.zip), or clone the sample web app from the [GitHub repo](https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal).
114114

115115
```bash
116-
git clone https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal/tree/vNext.git
116+
git clone https://github.com/Azure-Samples/active-directory-b2c-ios-swift-native-msal
117117
```
118118

119119
1. Use [CocoaPods](https://cocoapods.org/) to install the MSAL library. In a terminal window, go to the project root folder. This folder contains the *podfile* file. Run the following command:

articles/active-directory-b2c/partner-akamai-secure-hybrid-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -385,8 +385,8 @@ Once the Application is deployed in a private environment and a connector is cap
385385

386386
| Header Name | Attribute |
387387
|--------------|-----------|
388-
| ps-sso-first | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
389-
| ps-sso-last | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname |
388+
| ps-sso-first | `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name` |
389+
| ps-sso-last | `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname` |
390390
| ps-sso-EmailAddress | emailaddress |
391391
| ps-sso-uid | objectId |
392392

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,30 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
## December 2022
19+
20+
### New articles
21+
22+
- [Build a global identity solution with funnel-based approach](azure-ad-b2c-global-identity-funnel-based-design.md)
23+
- [Azure Active Directory B2C global identity framework proof of concept for funnel-based configuration](azure-ad-b2c-global-identity-proof-of-concept-funnel.md)
24+
- [Azure Active Directory B2C global identity framework proof of concept for region-based configuration](azure-ad-b2c-global-identity-proof-of-concept-regional.md)
25+
- [Build a global identity solution with region-based approach](azure-ad-b2c-global-identity-region-based-design.md)
26+
- [Azure Active Directory B2C global identity framework](azure-ad-b2c-global-identity-solutions.md)
27+
28+
### Updated articles
29+
30+
- [Set up a resource owner password credentials flow in Azure Active Directory B2C](add-ropc-policy.md)
31+
- [Use API connectors to customize and extend sign-up user flows and custom policies with external identity data sources](api-connectors-overview.md)
32+
- [Azure Active Directory B2C: Region availability & data residency](data-residency.md)
33+
- [Tutorial: Configure Experian with Azure Active Directory B2C](partner-experian.md)
34+
- [Tutorial: Configure Microsoft Dynamics 365 Fraud Protection with Azure Active Directory B2C](partner-dynamics-365-fraud-protection.md)
35+
- [Tutorial: Configure Azure Active Directory B2C with Datawiza to provide secure hybrid access](partner-datawiza.md)
36+
- [Configure TheAccessHub Admin Tool with Azure Active Directory B2C](partner-n8identity.md)
37+
- [Tutorial: Configure Cloudflare Web Application Firewall with Azure Active Directory B2C](partner-cloudflare.md)
38+
- [Set up a password reset flow in Azure Active Directory B2C](add-password-reset-policy.md)
39+
- [What is Azure Active Directory B2C?](overview.md)
40+
- [Technical and feature overview of Azure Active Directory B2C](technical-overview.md)
41+
1842
## November 2022
1943

2044
### New articles
@@ -138,4 +162,4 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
138162
- [Application types that can be used in Active Directory B2C](application-types.md)
139163
- [Publish your Azure Active Directory B2C app to the Azure Active Directory app gallery](publish-app-to-azure-ad-app-gallery.md)
140164
- [Quickstart: Set up sign in for a desktop app using Azure Active Directory B2C](quickstart-native-app-desktop.md)
141-
- [Register a single-page application (SPA) in Azure Active Directory B2C](tutorial-register-spa.md)
165+
- [Register a single-page application (SPA) in Azure Active Directory B2C](tutorial-register-spa.md)

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom: has-adal-ref
1919

2020
# Certificate user IDs
2121

22-
Azure AD has a multivalued attribute named **certificateUserIds** on the user object that can be used in Username bindings. The attribute allows up to four values, and each value can be of 120-character length. It can store any value, and doesn't require email ID format. It can store non-routable User Principal Names (UPNs) like _bob@woodgrove_ or _bob@local_.
22+
Users in Azure AD can have a multivalued attribute named **certificateUserIds**. The attribute allows up to four values, and each value can be of 120-character length. It can store any value, and doesn't require email ID format. It can store non-routable User Principal Names (UPNs) like _bob@woodgrove_ or _bob@local_.
2323

2424
## Supported patterns for certificate user IDs
2525

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 01/05/2023
7+
ms.date: 01/06/2023
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -85,7 +85,7 @@ To create the registry key that overrides push notifications:
8585
Value = TRUE
8686
1. Restart the NPS Service.
8787

88-
If you're using Remote Desktop Gateway, the user account must be configured for phone verification, or Microsoft Authenticator push notifications. If neither option is configured, the user won't be able to meet the Azure AD MFA challenge, and Remote Desktop Gateway sign-in will fail. In this case, you can set OVERRIDE_NUMBER_MATCHING_WITH_OTP = FALSE.
88+
If you're using Remote Desktop Gateway and the user is registered for OTP code along with Microsoft Authenticator push notifications, the user won't be able to meet the Azure AD MFA challenge and Remote Desktop Gateway sign-in will fail. In this case, you can set OVERRIDE_NUMBER_MATCHING_WITH_TOP = FALSE to fall back to push notifications with Microsoft Authenticator.
8989

9090
### Apple Watch supported for Microsoft Authenticator
9191

@@ -323,7 +323,7 @@ They'll see a prompt to supply a verification code. They must select their accou
323323

324324
### Can I opt out of number matching?
325325

326-
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants starting February 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
326+
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. To protect the ecosystem and mitigate these threats, Microsoft will enable number matching for all tenants starting February 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
327327

328328
### Does number matching only apply if Microsoft Authenticator is set as the default authentication method?
329329

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -104,11 +104,11 @@ When you install the extension, you need the *Tenant ID* and admin credentials f
104104

105105
### Network requirements
106106

107-
The NPS server must be able to communicate with the following URLs over ports 80 and 443:
107+
The NPS server must be able to communicate with the following URLs over TCP port 443:
108108

109-
* *https:\//strongauthenticationservice.auth.microsoft.com*
110-
* *https:\//strongauthenticationservice.auth.microsoft.us*
111-
* *https:\//strongauthenticationservice.auth.microsoft.cn*
109+
* *https:\//strongauthenticationservice.auth.microsoft.com* (for Azure Public cloud customers).
110+
* *https:\//strongauthenticationservice.auth.microsoft.us* (for Azure Government customers).
111+
* *https:\//strongauthenticationservice.auth.microsoft.cn* (for Azure China 21Vianet customers).
112112
* *https:\//adnotifications.windowsazure.com*
113113
* *https:\//login.microsoftonline.com*
114114
* *https:\//credentials.azure.com*

articles/active-directory/azuread-dev/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@ title: Azure Active Directory for developers
44
summary: |
55
Azure Active Directory (Azure AD) is a cloud identity service that allows developers to build apps that sign in users with a Microsoft work or school account. Azure AD supports building single-tenant line-of-business (LOB) apps as well as multi-tenant apps.
66
7-
IMPORTANT: This content is for the older Azure AD v1.0 endpoint, use the Microsoft identity platform for new projects.
7+
IMPORTANT: This content is for the older Azure AD v1.0 endpoint, use the Microsoft identity platform (https://aka.ms/identityplatform) for new projects.
88
99
metadata:
1010
ms.topic: landing-page
11-
ms.date: 01/27/2020
11+
ms.date: 01/06/2023
1212
author: CelesteDG
1313
ms.author: celested
1414
ms.service: active-directory

articles/active-directory/conditional-access/howto-conditional-access-policy-risk-user.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 08/22/2022
9+
ms.date: 01/06/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -39,7 +39,7 @@ Organizations can choose to deploy this policy using the steps outlined below or
3939
1. Under **Configure user risk levels needed for policy to be enforced**, select **High**.
4040
1. Select **Done**.
4141
1. Under **Access controls** > **Grant**.
42-
1. Select **Grant access**, **Require password change**.
42+
1. Select **Grant access**, **Require multifactor authentication** and **Require password change**.
4343
1. Select **Select**.
4444
1. Under **Session**.
4545
1. Select **Sign-in frequency**.

0 commit comments

Comments
 (0)