Skip to content

Commit fcc7b4d

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into nw-ct
2 parents b9d7682 + 62dbe52 commit fcc7b4d

File tree

465 files changed

+6606
-2695
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

465 files changed

+6606
-2695
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1039,6 +1039,12 @@
10391039
"url": "https://github.com/Azure/Azure-Proactive-Resiliency-Library",
10401040
"branch": "main",
10411041
"branch_mapping": {}
1042+
},
1043+
{
1044+
"path_to_root": "azure-reference-other-repo",
1045+
"url": "https://github.com/MicrosoftDocs/azure-reference-other-pr",
1046+
"branch": "main",
1047+
"branch_mapping": {}
10421048
}
10431049
],
10441050
"branch_target_mapping": {
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-auth.md",
5+
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-auth",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-auth-cli.md",
10+
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-auth-cli",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache.md",
15+
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path_from_root": "/articles/container-registry/tutorial-enable-registry-cache-cli.md",
20+
"redirect_url": "/azure/container-registry/tutorial-enable-artifact-cache-cli",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path_from_root": "/articles/container-registry/tutorial-registry-cache.md",
25+
"redirect_url": "/azure/container-registry/tutorial-artifact-cache",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path_from_root": "/articles/container-registry/tutorial-troubleshoot-registry-cache.md",
30+
"redirect_url": "/azure/container-registry/tutorial-troubleshoot-artifact-cache",
31+
"redirect_document_id": false
32+
}
33+
34+
35+
]
36+
}

articles/active-directory-b2c/custom-domain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Every new Azure AD B2C tenant comes with an initial domain name, <domainname&
6767

6868
Follow these steps to add a custom domain to your Azure AD B2C tenant:
6969

70-
1. [Add your custom domain name to Azure AD](../active-directory/fundamentals/add-custom-domain.md#add-your-custom-domain-name-to-azure-ad).
70+
1. [Add your custom domain name to Azure AD](../active-directory/fundamentals/add-custom-domain.md#add-your-custom-domain-name).
7171

7272
> [!IMPORTANT]
7373
> For these steps, be sure to sign in to your **Azure AD B2C** tenant and select the **Azure Active Directory** service.

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,14 @@ The following table lists each setting that can be set to Microsoft managed and
5353

5454
| Setting | Configuration |
5555
|-------------------------------------------------------------------------------------------------|---------------|
56-
| [Registration campaign](how-to-mfa-registration-campaign.md) | Beginning in July, 2023, enabled for SMS and voice call users with free and trial subscriptions. |
56+
| [Registration campaign](how-to-mfa-registration-campaign.md) | Beginning in July, 2023, enabled for text message and voice call users with free and trial subscriptions. |
5757
| [Location in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
5858
| [Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
5959
| [System-preferred MFA](concept-system-preferred-multifactor-authentication.md) | Enabled |
6060
| [Authenticator Lite](how-to-mfa-authenticator-lite.md) | Enabled |
6161
| [Report suspicious activity](howto-mfa-mfasettings.md#report-suspicious-activity) | Disabled |
6262

63-
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/). For example, see our blog post [It's Time to Hang Up on Phone Transports for Authentication](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752) for more information about the need to move away from using SMS and voice calls, which led to default enablement for the registration campaign to help users to set up Authenticator for modern authentication.
63+
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/). For example, see our blog post [It's Time to Hang Up on Phone Transports for Authentication](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752) for more information about the need to move away from using text message and voice calls, which led to default enablement for the registration campaign to help users to set up Authenticator for modern authentication.
6464

6565
## Next steps
6666

articles/active-directory/authentication/concept-authentication-methods-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ To manage the legacy MFA policy, click **Security** > **Multifactor Authenticati
4949

5050
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/service-settings.png" alt-text="Screenshot of MFA service settings.":::
5151

52-
To manage authentication methods for self-service password reset (SSPR), click **Password reset** > **Authentication methods**. The **Mobile phone** option in this policy allows either voice calls or SMS to be sent to a mobile phone. The **Office phone** option allows only voice calls.
52+
To manage authentication methods for self-service password reset (SSPR), click **Password reset** > **Authentication methods**. The **Mobile phone** option in this policy allows either voice calls or text message to be sent to a mobile phone. The **Office phone** option allows only voice calls.
5353

5454
:::image type="content" border="true" source="./media/concept-authentication-methods-manage/password-reset.png" alt-text="Screenshot of password reset settings.":::
5555

@@ -69,7 +69,7 @@ If the user can't register Microsoft Authenticator based on either of those poli
6969
- **Mobile app notification**
7070
- **Mobile app code**
7171

72-
For users who are enabled for **Mobile phone** for SSPR, the independent control between policies can impact sign-in behavior. Where the other policies have separate options for SMS and voice calls, the **Mobile phone** for SSPR enables both options. As a result, anyone who uses **Mobile phone** for SSPR can also use voice calls for password reset, even if the other policies don't allow voice calls.
72+
For users who are enabled for **Mobile phone** for SSPR, the independent control between policies can impact sign-in behavior. Where the other policies have separate options for text message and voice calls, the **Mobile phone** for SSPR enables both options. As a result, anyone who uses **Mobile phone** for SSPR can also use voice calls for password reset, even if the other policies don't allow voice calls.
7373

7474
Similarly, let's suppose you enable **Voice calls** for a group. After you enable it, you find that even users who aren't group members can sign-in with a voice call. In this case, it's likely those users are enabled for **Mobile phone** in the legacy SSPR policy or **Call to phone** in the legacy MFA policy.
7575

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Microsoft recommends passwordless authentication methods such as Windows Hello,
2323

2424
:::image type="content" border="true" source="media/concept-authentication-methods/authentication-methods.png" alt-text="Illustration of the strengths and preferred authentication methods in Azure AD." :::
2525

26-
Azure AD Multi-Factor Authentication (MFA) adds additional security over only using a password when a user signs in. The user can be prompted for additional forms of authentication, such as to respond to a push notification, enter a code from a software or hardware token, or respond to an SMS or phone call.
26+
Azure AD Multi-Factor Authentication (MFA) adds additional security over only using a password when a user signs in. The user can be prompted for additional forms of authentication, such as to respond to a push notification, enter a code from a software or hardware token, or respond to a text message or phone call.
2727

2828
To simplify the user on-boarding experience and register for both MFA and self-service password reset (SSPR), we recommend you [enable combined security information registration](howto-registration-mfa-sspr-combined.md). For resiliency, we recommend that you require users to register multiple authentication methods. When one method isn't available for a user during sign-in or SSPR, they can choose to authenticate with another method. For more information, see [Create a resilient access control management strategy in Azure AD](concept-resilient-controls.md).
2929

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 07/17/2023
9+
ms.date: 09/12/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -19,16 +19,16 @@ ms.collection: M365-identity-device-management
1919

2020
# Authentication methods in Azure Active Directory - phone options
2121

22-
Microsoft recommends users move away from using SMS or voice calls for multifactor authentication (MFA). Modern authentication methods like [Microsoft Authenticator](concept-authentication-authenticator-app.md) are a recommended alternative. For more information, see [It's Time to Hang Up on Phone Transports for Authentication](https://aka.ms/hangup). Users can still verify themselves using a mobile phone or office phone as secondary form of authentication used for multifactor authentication (MFA) or self-service password reset (SSPR).
22+
Microsoft recommends users move away from using text message or voice calls for multifactor authentication (MFA). Modern authentication methods like [Microsoft Authenticator](concept-authentication-authenticator-app.md) are a recommended alternative. For more information, see [It's Time to Hang Up on Phone Transports for Authentication](https://aka.ms/hangup). Users can still verify themselves using a mobile phone or office phone as secondary form of authentication used for multifactor authentication (MFA) or self-service password reset (SSPR).
2323

24-
You can [configure and enable users for SMS-based authentication](howto-authentication-sms-signin.md) for direct authentication using text message. SMS-based sign-in is convenient for Frontline workers. With SMS-based sign-in, users don't need to know a username and password to access applications and services. The user instead enters their registered mobile phone number, receives a text message with a verification code, and enters that in the sign-in interface.
24+
You can [configure and enable users for SMS-based authentication](howto-authentication-sms-signin.md) for direct authentication using SMS. SMS sign-in is convenient for Frontline workers. With SMS sign-in, users don't need to know a username and password to access applications and services. The user instead enters their registered mobile phone number, receives a text message with a verification code, and enters that in the sign-in interface.
2525

2626
>[!NOTE]
2727
>Phone call verification isn't available for Azure AD tenants with trial subscriptions. For example, if you sign up for a trial license Microsoft Enterprise Mobility and Security (EMS), phone call verification isn't available. Phone numbers must be provided in the format *+CountryCode PhoneNumber*, for example, *+1 4251234567*. There must be a space between the country/region code and the phone number.
2828
2929
## Mobile phone verification
3030

31-
For Azure AD Multi-Factor Authentication or SSPR, users can choose to receive an SMS message with a verification code to enter in the sign-in interface, or receive a phone call.
31+
For Azure AD Multi-Factor Authentication or SSPR, users can choose to receive a text message with a verification code to enter in the sign-in interface, or receive a phone call.
3232

3333
If users don't want their mobile phone number to be visible in the directory but want to use it for password reset, administrators shouldn't populate the phone number in the directory. Instead, users should populate their **Authentication Phone** at [My Sign-Ins](https://aka.ms/setupsecurityinfo). Administrators can see this information in the user's profile, but it's not published elsewhere.
3434

@@ -37,16 +37,16 @@ If users don't want their mobile phone number to be visible in the directory but
3737
> [!NOTE]
3838
> Phone extensions are supported only for office phones.
3939
40-
Microsoft doesn't guarantee consistent SMS or voice-based Azure AD Multi-Factor Authentication prompt delivery by the same number. In the interest of our users, we may add or remove short codes at any time as we make route adjustments to improve SMS deliverability. Microsoft doesn't support short codes for countries/regions besides the United States and Canada.
40+
Microsoft doesn't guarantee consistent text message or voice-based Azure AD Multi-Factor Authentication prompt delivery by the same number. In the interest of our users, we may add or remove short codes at any time as we make route adjustments to improve text message deliverability. Microsoft doesn't support short codes for countries/regions besides the United States and Canada.
4141

4242
> [!NOTE]
43-
> Starting July 2023, we will apply delivery method optimizations such that tenants with a free or trial subscription may receive an SMS message or voice call.
43+
> Starting July 2023, we will apply delivery method optimizations such that tenants with a free or trial subscription may receive a text message or voice call.
4444
45-
### SMS message verification
45+
### Text message verification
4646

47-
With SMS message verification during SSPR or Azure AD Multi-Factor Authentication, a Short Message Service (SMS) text is sent to the mobile phone number containing a verification code. To complete the sign-in process, the verification code provided is entered into the sign-in interface.
47+
With text message verification during SSPR or Azure AD Multi-Factor Authentication, a text message is sent to the mobile phone number containing a verification code. To complete the sign-in process, the verification code provided is entered into the sign-in interface.
4848

49-
Android users can enable Rich Communication Services (RCS) on their devices. RCS offers encryption and other improvements over SMS. For Android, MFA text messages may be sent over RCS rather than SMS. The MFA text message is similar to SMS, but RCS messages have more Microsoft branding and a verified checkmark so users know they can trust the message.
49+
Android users can enable Rich Communication Services (RCS) on their devices. RCS offers encryption and other improvements over Simple Message Service (SMS). For Android, MFA text messages may be sent over RCS rather than SMS. The experience is similar to text message, but RCS messages have more Microsoft branding and a verified checkmark so users know they can trust the message.
5050

5151
:::image type="content" source="media/concept-authentication-methods/brand.png" alt-text="Screenshot of Microsoft branding in RCS messages.":::
5252

@@ -64,10 +64,10 @@ With office phone call verification during SSPR or Azure AD Multi-Factor Authent
6464

6565
If you have problems with phone authentication for Azure AD, review the following troubleshooting steps:
6666

67-
* You've hit our limit on verification calls or Youve hit our limit on text verification codes error messages during sign-in
67+
* "You've hit our limit on verification calls" or "You've hit our limit on text verification codes" error messages during sign-in
6868
* Microsoft may limit repeated authentication attempts that are performed by the same user or organization in a short period of time. This limitation does not apply to Microsoft Authenticator or verification codes. If you have hit these limits, you can use the Authenticator App, verification code or try to sign in again in a few minutes.
6969
* "Sorry, we're having trouble verifying your account" error message during sign-in
70-
* Microsoft may limit or block voice or SMS authentication attempts that are performed by the same user, phone number, or organization due to high number of voice or SMS authentication attempts. If you are experiencing this error, you can try another method, such as Authenticator App or verification code, or reach out to your admin for support.
70+
* Microsoft may limit or block voice or text message authentication attempts that are performed by the same user, phone number, or organization due to high number of voice or text message authentication attempts. If you are experiencing this error, you can try another method, such as Authenticator App or verification code, or reach out to your admin for support.
7171
* Blocked caller ID on a single device.
7272
* Review any blocked numbers configured on the device.
7373
* Wrong phone number or incorrect country/region code, or confusion between personal phone number versus work phone number.
@@ -78,13 +78,13 @@ If you have problems with phone authentication for Azure AD, review the followin
7878
* Ensure that the user has their phone turned on and that service is available in their area, or use alternate method.
7979
* User is blocked
8080
* Have an Azure AD administrator unblock the user in the Azure portal.
81-
* SMS is not subscribed on the device.
82-
* Have the user change methods or activate SMS on the device.
83-
* Faulty telecom providers such as no phone input detected, missing DTMF tones issues, blocked caller ID on multiple devices, or blocked SMS across multiple devices.
84-
* Microsoft uses multiple telecom providers to route phone calls and SMS messages for authentication. If you see any of the above issues, have a user attempt to use the method at least five times within 5 minutes and have that user's information available when contacting Microsoft support.
81+
* text message is not subscribed on the device.
82+
* Have the user change methods or activate text message on the device.
83+
* Faulty telecom providers such as no phone input detected, missing DTMF tones issues, blocked caller ID on multiple devices, or blocked text messages across multiple devices.
84+
* Microsoft uses multiple telecom providers to route phone calls and text messages for authentication. If you see any of the above issues, have a user attempt to use the method at least five times within 5 minutes and have that user's information available when contacting Microsoft support.
8585
* Poor signal quality.
8686
* Have the user attempt to log in using a wi-fi connection by installing the Authenticator app.
87-
* Or, use SMS authentication instead of phone (voice) authentication.
87+
* Or, use text message authentication instead of phone (voice) authentication.
8888

8989
* Phone number is blocked and unable to be used for Voice MFA
9090

0 commit comments

Comments
 (0)