Skip to content

Commit fbd7615

Browse files
committed
Merge branch 'main' into release-preview-aml-cli-v2-refresh
2 parents 00a3d95 + 267c34d commit fbd7615

File tree

232 files changed

+5921
-2840
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

232 files changed

+5921
-2840
lines changed

.openpublishing.redirection.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -913,6 +913,16 @@
913913
"redirect_url": "/azure/frontdoor/",
914914
"redirect_document_id": false
915915
},
916+
{
917+
"source_path_from_root": "/articles/frontdoor/front-door-lb-with-azure-app-delivery-suite.md",
918+
"redirect_url": "/azure/architecture/guide/technology-choices/load-balancing-overview",
919+
"redirect_document_id": false
920+
},
921+
{
922+
"source_path_from_root": "/articles/frontdoor/standard-premium/overview.md",
923+
"redirect_url": "/azure/frontdoor/front-door-overview",
924+
"redirect_document_id": false
925+
},
916926
{
917927
"source_path_from_root": "/articles/app-service-web/web-sites-dotnet-deploy-aspnet-mvc-app-membership-oauth-sql-database.md",
918928
"redirect_url": "/aspnet/core/security/authorization/secure-data",
@@ -3118,6 +3128,21 @@
31183128
"redirect_url": "/azure/application-gateway/waf-overview",
31193129
"redirect_document_id": false
31203130
},
3131+
{
3132+
"source_path_from_root": "/articles/application-gateway/create-web-app.md",
3133+
"redirect_url": "/azure/application-gateway/configure-web-app",
3134+
"redirect_document_id": false
3135+
},
3136+
{
3137+
"source_path_from_root": "/articles/application-gateway/configure-web-app-portal.md",
3138+
"redirect_url": "/azure/application-gateway/configure-web-app",
3139+
"redirect_document_id": false
3140+
},
3141+
{
3142+
"source_path_from_root": "/articles/application-gateway/application-gateway-web-app-overview.md",
3143+
"redirect_url": "/azure/application-gateway/configure-web-app",
3144+
"redirect_document_id": false
3145+
},
31213146
{
31223147
"source_path_from_root": "/articles/application-insights/app-insights-developer-analytics.md",
31233148
"redirect_url": "/azure/application-insights/",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -451,6 +451,8 @@
451451
- name: Identity verification and proofing partners
452452
href: identity-verification-proofing.md
453453
displayName: id verify, id verification, azure ad b2c proofing, id proofing
454+
- name: eID-Me
455+
href: partner-eid-me.md
454456
- name: Experian
455457
href: partner-experian.md
456458
- name: IDology
93.1 KB
Loading
52.3 KB
Loading
1.83 KB
Loading

articles/active-directory-b2c/partner-eid-me.md

Lines changed: 606 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/partner-gallery.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,10 @@ Microsoft partners with the following ISVs for identity verification and proofin
2929

3030
| ISV partner | Description and integration walkthroughs |
3131
|:-------------------------|:--------------|
32-
|![Screenshot of an Experian logo.](./media/partner-gallery/experian-logo.png) | [Experian](./partner-experian.md) is an identity verification and proofing provider that performs risk assessments based on user attributes to prevent fraud. |
33-
|![Screenshot of an IDology logo.](./media/partner-gallery/idology-logo.png) | [IDology](./partner-idology.md) is an identity verification and proofing provider with ID verification solutions, fraud prevention solutions, compliance solutions, and others.|
34-
|![Screenshot of a Jumio logo.](./media/partner-gallery/jumio-logo.png) | [Jumio](./partner-jumio.md) is an ID verification service, which enables real-time automated ID verification, safeguarding customer data. |
32+
| ![Screenshot of a eid-me logo](./media/partner-gallery/eid-me-logo.png) | [eID-Me](./partner-eid-me.md) is an identity verification and decentralized digital identity solution for Canadian citizens. It enables organizations to meet Identity Assurance Level (IAL) 2 and Know Your Customer (KYC) requirements. |
33+
| ![Screenshot of an Experian logo.](./media/partner-gallery/experian-logo.png) | [Experian](./partner-experian.md) is an identity verification and proofing provider that performs risk assessments based on user attributes to prevent fraud. |
34+
| ![Screenshot of an IDology logo.](./media/partner-gallery/idology-logo.png) | [IDology](./partner-idology.md) is an identity verification and proofing provider with ID verification solutions, fraud prevention solutions, compliance solutions, and others.|
35+
| ![Screenshot of a Jumio logo.](./media/partner-gallery/jumio-logo.png) | [Jumio](./partner-jumio.md) is an ID verification service, which enables real-time automated ID verification, safeguarding customer data. |
3536
| ![Screenshot of a LexisNexis logo.](./media/partner-gallery/lexisnexis-logo.png) | [LexisNexis](./partner-lexisnexis.md) is a profiling and identity validation provider that verifies user identification and provides comprehensive risk assessment based on user’s device. |
3637
| ![Screenshot of a Onfido logo](./media/partner-gallery/onfido-logo.png) | [Onfido](./partner-onfido.md) is a document ID and facial biometrics verification solution that allows companies to meet *Know Your Customer* and identity requirements in real time. |
3738

articles/active-directory/develop/scenario-desktop-acquire-token-wam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Using an authentication broker such as WAM has numerous benefits.
3535
- Enhanced security (your app does not have to manage the powerful refresh token)
3636
- Better support for Windows Hello, Conditional Access and FIDO keys
3737
- Integration with Windows' "Email and Accounts" view
38-
- Better Single Sing-On (users don't have to reenter passwords)
38+
- Better Single Sign-On (users don't have to reenter passwords)
3939
- Most bug fixes and enhancements will be shipped with Windows
4040

4141
## WAM limitations

articles/active-directory/identity-protection/concept-workload-identity-risk.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@ We detect risk on workload identities across sign-in behavior and offline indica
5353
| Suspicious Sign-ins | Offline | This risk detection indicates sign-in properties or patterns that are unusual for this service principal. <br><br> The detection learns the baselines sign-in behavior for workload identities in your tenant in between 2 and 60 days, and fires if one or more of the following unfamiliar properties appear during a later sign-in: IP address / ASN, target resource, user agent, hosting/non-hosting IP change, IP country, credential type. <br><br> Because of the programmatic nature of workload identity sign-ins, we provide a timestamp for the suspicious activity instead of flagging a specific sign-in event. <br><br> Sign-ins that are initiated after an authorized configuration change may trigger this detection. |
5454
| Unusual addition of credentials to an OAuth app | Offline | This detection is discovered by [Microsoft Defender for Cloud Apps](/defender-cloud-apps/investigate-anomaly-alerts#unusual-addition-of-credentials-to-an-oauth-app). This detection identifies the suspicious addition of privileged credentials to an OAuth app. This can indicate that an attacker has compromised the app, and is using it for malicious activity. |
5555
| Admin confirmed account compromised | Offline | This detection indicates an admin has selected 'Confirm compromised' in the Risky Workload Identities UI or using riskyServicePrincipals API. To see which admin has confirmed this account compromised, check the account’s risk history (via UI or API). |
56+
| Leaked Credentials (public preview) | Offline | This risk detection indicates that the account's valid credentials have been leaked. This leak can occur when someone checks in the credentials in public code artifact on GitHub, or when the credentials are leaked through a data breach. <br><br> When the Microsoft leaked credentials service acquires credentials from GitHub, the dark web, paste sites, or other sources, they're checked against current valid credentials in Azure AD to find valid matches. |
5657

5758
## Identify risky workload identities
5859

articles/active-directory/privileged-identity-management/pim-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ Privileged Identity Management provides time-based and approval-based role activ
5151
- Get **notifications** when privileged roles are activated
5252
- Conduct **access reviews** to ensure users still need roles
5353
- Download **audit history** for internal or external audit
54-
- Prevents removal of the **last active Global Administrator** role assignment
54+
- Prevents removal of the **last active Global Administrator** and **Privileged Role Administrator** role assignments
5555

5656
## What can I do with it?
5757

0 commit comments

Comments
 (0)