Skip to content

Commit ffe15b3

Browse files
authored
Merge pull request #193310 from MicrosoftDocs/main
3/29 PM Publish
2 parents 0e21f50 + 27b1f05 commit ffe15b3

File tree

109 files changed

+1061
-721
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

109 files changed

+1061
-721
lines changed

.openpublishing.redirection.media-services.json

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -628,12 +628,12 @@
628628
{
629629
"source_path_from_root": "/articles/media-services/latest/asset-create-asset-upload-portal-quickstart.md",
630630
"redirect_url": "/azure/media-services/latest/video-on-demand-simple-portal-quickstart",
631-
"redirect_document_id": true
631+
"redirect_document_id": false
632632
},
633633
{
634634
"source_path_from_root": "/articles/media-services/latest/architecture-design-multi-drm-system.md",
635635
"redirect_url": "/azure/media-services/latest/drm-content-protection-concept",
636-
"redirect_document_id": true
636+
"redirect_document_id": false
637637
},
638638
{
639639
"source_path_from_root": "/articles/media-services/latest/job-create-cli-how-to.md",
@@ -644,7 +644,7 @@
644644
"source_path_from_root": "/articles/media-services/latest/transform-subclip-video-dotnet-how-to.md",
645645
"redirect_url": "/azure/media-services/latest/transform-subclip-video-how-to",
646646
"redirect_document_id": false
647-
},
647+
},
648648
{
649649
"source_path_from_root": "/articles/media-services/latest/transform-subclip-video-rest-how-to.md",
650650
"redirect_url": "/azure/media-services/latest/transform-subclip-video-how-to",
@@ -659,12 +659,12 @@
659659
"source_path_from_root": "/articles/media-services/latest/transform-generate-thumbnails-dotnet-how-to.md",
660660
"redirect_url": "/azure/media-services/latest/transform-generate-thumbnails-how-to",
661661
"redirect_document_id": false
662-
},
662+
},
663663
{
664664
"source_path_from_root": "/articles/media-services/latest/crop-howto.md",
665665
"redirect_url": "/azure/media-services/latest/transform-crop-how-to",
666666
"redirect_document_id": false
667-
},
667+
},
668668
{
669669
"source_path_from_root": "/articles/media-services/latest/transform-custom-preset-cli-how-to.md",
670670
"redirect_url": "/azure/media-services/latest/transform-custom-transform-how-to",
@@ -694,6 +694,6 @@
694694
"source_path_from_root": "/articles/media-services/video-indexer/upload-index-video.md",
695695
"redirect_url": "/azure/azure-video-analyzer/video-analyzer-for-media-docs/upload-index-video",
696696
"redirect_document_id": false
697-
}
697+
}
698698
]
699699
}

CODEOWNERS

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@
55
# NOTE: The people you choose as code owners must have _write_ permissions for the repository. When the code owner is a team, that team must be _visible_ and it must have _write_ permissions, even if all the individual members of the team already have write permissions directly, through organization membership, or through another team membership.
66

77
# Azure Policy: Samples and Compliance Controls
8-
/articles/**/policy-reference.md @DCtheGeek
9-
/articles/**/security-controls-policy.md @DCtheGeek
10-
/includes/policy/ @DCtheGeek
8+
/articles/**/policy-reference.md @timwarner
9+
/articles/**/security-controls-policy.md @timwarner
10+
/includes/policy/ @timwarner
1111

1212
# Azure Monitor
1313
articles/azure-monitor/* @bwren
@@ -57,7 +57,7 @@ articles/service-health @rboucher
5757
/articles/container-registry/ @dlepow @mimckitt
5858

5959
# Governance
60-
/articles/governance/ @DCtheGeek
60+
/articles/governance/ @timwarner
6161

6262
# Security
6363
/articles/security/fundamentals/feature-availability.md @msmbaldwin @terrylanfear

articles/active-directory/conditional-access/concept-continuous-access-evaluation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ CAE only has insight into [IP-based named locations](../conditional-access/locat
194194
195195
### Named location limitations
196196

197-
When the sum of all IP ranges specified in location policies exceeds 5,000 for policies that will be enforced on the Resource provider, user change location flow isn't enforced. In this case, Azure AD will issue a one-hour CAE token and won't enforce client location change; security is improved compared to traditional one-hour tokens since we're still evaluating the [other events](#critical-event-evaluation) besides client location change events.
197+
When the sum of all IP ranges specified in location policies exceeds 5,000, user change location flow won't be enforced by CAE in real time. In this case, Azure AD will issue a one-hour CAE token. CAE will continue enforcing [all other events and policies](#critical-event-evaluation) besides client location change events. With this change, you still maintain stronger security posture compared to traditional one-hour tokens, since [other events](#critical-event-evaluation) will be evaluated in near real time.
198198

199199
### Office and Web Account Manager settings
200200

articles/active-directory/conditional-access/howto-conditional-access-insights-reporting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,7 @@ To configure a Conditional Access policy in report-only mode:
117117
In order to access the workbook, you need the proper Azure AD permissions as well as Log Analytics workspace permissions. To test whether you have the proper workspace permissions by running a sample log analytics query:
118118

119119
1. Sign in to the **Azure portal**.
120-
1. Browse to **Azure Active Directory** > **Logs**.
120+
1. Browse to **Azure Active Directory** > **Log Analytics**.
121121
1. Type `SigninLogs` into the query box and select **Run**.
122122
1. If the query does not return any results, your workspace may not have been configured correctly.
123123

articles/active-directory/conditional-access/howto-conditional-access-policy-all-users-mfa.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 11/05/2021
9+
ms.date: 03/28/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -29,13 +29,17 @@ Conditional Access policies are powerful tools, we recommend excluding the follo
2929

3030
* **Emergency access** or **break-glass** accounts to prevent tenant-wide account lockout. In the unlikely scenario all administrators are locked out of your tenant, your emergency-access administrative account can be used to log into the tenant take steps to recover access.
3131
* More information can be found in the article, [Manage emergency access accounts in Azure AD](../roles/security-emergency-access.md).
32-
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that aren't tied to any particular user. They're normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals are not blocked by Conditional Access.
32+
* **Service accounts** and **service principals**, such as the Azure AD Connect Sync Account. Service accounts are non-interactive accounts that aren't tied to any particular user. They're normally used by back-end services allowing programmatic access to applications, but are also used to sign in to systems for administrative purposes. Service accounts like these should be excluded since MFA can't be completed programmatically. Calls made by service principals aren't blocked by Conditional Access.
3333
* If your organization has these accounts in use in scripts or code, consider replacing them with [managed identities](../managed-identities-azure-resources/overview.md). As a temporary workaround, you can exclude these specific accounts from the baseline policy.
3434

3535
## Application exclusions
3636

3737
Organizations may have many cloud applications in use. Not all of those applications may require equal security. For example, the payroll and attendance applications may require MFA but the cafeteria probably doesn't. Administrators can choose to exclude specific applications from their policy.
3838

39+
### Subscription activation
40+
41+
Organizations that use the [Subscription Activation](/windows/deployment/windows-10-subscription-activation) feature to enable users to “step-up” from one version of Windows to another, may want to exclude the Universal Store Service APIs and Web Application, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f from their all users all cloud apps MFA policy.
42+
3943
## Template deployment
4044

4145
Organizations can choose to deploy this policy using the steps outlined below or using the [Conditional Access templates (Preview)](concept-conditional-access-policy-common.md#conditional-access-templates-preview).

articles/active-directory/conditional-access/howto-conditional-access-policy-compliant-device.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 11/05/2021
9+
ms.date: 03/28/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -63,6 +63,10 @@ After confirming your settings using [report-only mode](howto-conditional-access
6363

6464
On Windows 7, iOS, Android, macOS, and some third-party web browsers, Azure AD identifies the device using a client certificate that is provisioned when the device is registered with Azure AD. When a user first signs in through the browser the user is prompted to select the certificate. The end user must select this certificate before they can continue to use the browser.
6565

66+
#### Subscription activation
67+
68+
Organizations that use the [Subscription Activation](/windows/deployment/windows-10-subscription-activation) feature to enable users to “step-up” from one version of Windows to another, may want to exclude the Universal Store Service APIs and Web Application, AppID 45a330b1-b1ec-4cc1-9161-9f03992aa49f from their device compliance policy.
69+
6670
## Next steps
6771

6872
[Conditional Access common policies](concept-conditional-access-policy-common.md)

articles/active-directory/develop/howto-create-self-signed-certificate.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -51,16 +51,16 @@ Use the certificate you create using this method to authenticate from an applica
5151
In an elevated PowerShell prompt, run the following command and leave the PowerShell console session open. Replace `{certificateName}` with the name that you wish to give to your certificate.
5252

5353
```powershell
54-
55-
$cert = New-SelfSignedCertificate -Subject "CN={certificateName}" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature -KeyLength 2048 -KeyAlgorithm RSA -HashAlgorithm SHA256 ## Replace {certificateName}
54+
$certname = "{certificateName}" ## Replace {certificateName}
55+
$cert = New-SelfSignedCertificate -Subject "CN=$certname" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature -KeyLength 2048 -KeyAlgorithm RSA -HashAlgorithm SHA256
5656
5757
```
5858

5959
The **$cert** variable in the previous command stores your certificate in the current session and allows you to export it. The command below exports the certificate in `.cer` format. You can also export it in other formats supported on the Azure portal including `.pem` and `.crt`.
6060

6161
```powershell
6262
63-
Export-Certificate -Cert $cert -FilePath "C:\Users\admin\Desktop\{certificateName}.cer" ## Specify your preferred location and replace {certificateName}
63+
Export-Certificate -Cert $cert -FilePath "C:\Users\admin\Desktop\$certname.cer" ## Specify your preferred location
6464
6565
```
6666

@@ -74,8 +74,8 @@ Use this option to create a certificate and its private key if your application
7474
In an elevated PowerShell prompt, run the following command and leave the PowerShell console session open. Replace `{certificateName}` with name that you wish to give your certificate.
7575

7676
```powershell
77-
78-
$cert = New-SelfSignedCertificate -Subject "CN={certificateName}" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature -KeyLength 2048 -KeyAlgorithm RSA -HashAlgorithm SHA256 ## Replace {certificateName}
77+
$certname = "{certificateName}" ## Replace {certificateName}
78+
$cert = New-SelfSignedCertificate -Subject "CN=$certname" -CertStoreLocation "Cert:\CurrentUser\My" -KeyExportPolicy Exportable -KeySpec Signature -KeyLength 2048 -KeyAlgorithm RSA -HashAlgorithm SHA256
7979
8080
```
8181

@@ -84,7 +84,7 @@ The **$cert** variable in the previous command stores your certificate in the cu
8484

8585
```powershell
8686
87-
Export-Certificate -Cert $cert -FilePath "C:\Users\admin\Desktop\{certificateName}.cer" ## Specify your preferred location and replace {certificateName}
87+
Export-Certificate -Cert $cert -FilePath "C:\Users\admin\Desktop\$certname.cer" ## Specify your preferred location
8888
8989
```
9090

@@ -100,7 +100,7 @@ Now, using the password you stored in the `$mypwd` variable, secure, and export
100100

101101
```powershell
102102
103-
Export-PfxCertificate -Cert $cert -FilePath "C:\Users\admin\Desktop\{privateKeyName}.pfx" -Password $mypwd ## Specify your preferred location and replace {privateKeyName}
103+
Export-PfxCertificate -Cert $cert -FilePath "C:\Users\admin\Desktop\$certname.pfx" -Password $mypwd ## Specify your preferred location
104104
105105
```
106106

@@ -113,7 +113,7 @@ If you created the certificate using Option 2, you can delete the key pair from
113113

114114
```powershell
115115
116-
Get-ChildItem -Path "Cert:\CurrentUser\My" | Where-Object {$_.Subject -Match "{certificateName}"} | Select-Object Thumbprint, FriendlyName ## Replace {privateKeyName} with the name you gave your certificate
116+
Get-ChildItem -Path "Cert:\CurrentUser\My" | Where-Object {$_.Subject -Match "$certname"} | Select-Object Thumbprint, FriendlyName
117117
118118
```
119119

articles/active-directory/develop/tutorial-v2-windows-desktop.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.author: jmprieur
1515
ms.custom: aaddev, identityplatformtop40
1616
---
1717

18-
# Tutorial: Call the Microsoft Graph API from a Windows Desktop app
18+
# Tutorial: Sign in users and call Microsoft Graph in Windows Presentation Foundation (WPF) desktop app
1919

2020
In this tutorial, you build a native Windows Desktop .NET (XAML) app that signs in users and gets an access token to call the Microsoft Graph API.
2121

articles/active-directory/hybrid/how-to-connect-fed-saml-idp.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.tgt_pltfrm: na
1111
ms.topic: how-to
12-
ms.date: 01/21/2022
12+
ms.date: 03/29/2022
1313
ms.subservice: hybrid
1414
ms.author: billmath
1515
ms.collection: M365-identity-device-management
@@ -262,7 +262,6 @@ This procedure shows how to add a single user to Azure AD.
262262
-FirstName Elwood `
263263
-LastName Folk `
264264
-AlternateEmailAddresses "[email protected]" `
265-
-LicenseAssignment "samlp2test:ENTERPRISEPACK" `
266265
-UsageLocation "US"
267266
```
268267

articles/active-directory/manage-apps/f5-aad-integration.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -168,6 +168,8 @@ Refer to the following guided configuration tutorials using Easy Button template
168168

169169
- [BIG-IP Easy Button for SSO to Oracle JD Edwards](f5-big-ip-oracle-jde-easy-button.md)
170170

171+
- [BIG-IP Easy Button for SSO to SAP ERP](f5-big-ip-sap-erp-easy-button.md)
172+
171173
## Azure AD B2B guest access
172174
Azure AD B2B guest access to SHA protected applications is also possible, but some scenarios may require some additional steps not covered in the tutorials. One example is Kerberos SSO, where a BIG-IP will perform kerberos constrained delegation (KCD) to obtain a service ticket from domain contollers. Without a local representation of a guest user exisiting locally, a domain controller will fail to honour the request on the basis that the user does not exist. To support this scenario, you would need to ensure external identities are flowed down from your Azure AD tenant to the directory used by the application. See [Grant B2B users in Azure AD access to your on-premises applications](../external-identities/hybrid-cloud-to-on-premises.md) for guidance.
173175

0 commit comments

Comments
 (0)