Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
…into nitinme-quick-update
  • Loading branch information
nitinme committed May 24, 2022
2 parents ba0a613 + 876e8f8 commit 6a9f84e
Show file tree
Hide file tree
Showing 609 changed files with 12,115 additions and 5,209 deletions.
50 changes: 50 additions & 0 deletions .openpublishing.redirection.json
Original file line number Diff line number Diff line change
Expand Up @@ -17833,6 +17833,26 @@
"redirect_url": "/azure/iot-dps/quick-setup-auto-provision-cli",
"redirect_document_id": false
},
{
"source_path_from_root": "/articles/iot-dps/tutorial-net-provision-device-to-hub.md",
"redirect_url": "/azure/iot-dps/",
"redirect_document_id": false
},
{
"source_path_from_root": "/articles/iot-dps/tutorial-provision-device-to-hub.md",
"redirect_url": "/azure/iot-dps/quick-create-simulated-device-symm-key",
"redirect_document_id": false
},
{
"source_path_from_root": "/articles/iot-dps/tutorial-set-up-cloud.md",
"redirect_url": "/azure/iot-dps/quick-create-simulated-device-symm-key",
"redirect_document_id": false
},
{
"source_path_from_root": "/articles/iot-dps/tutorial-set-up-device.md",
"redirect_url": "/azure/iot-dps/quick-create-simulated-device-symm-key",
"redirect_document_id": false
},
{
"source_path_from_root": "/articles/security/fundamentals/iot-overview.md",
"redirect_url": "/azure/iot-fundamentals/iot-security-architecture",
Expand Down Expand Up @@ -21204,6 +21224,16 @@
"redirect_url": "/azure/machine-learning/v1/reference-pipeline-yaml",
"redirect_document_id": false
},
{
"source_path_from_root": "/articles/machine-learning/how-to-create-register-datasets.md",
"redirect_url": "/azure/machine-learning/how-to-create-register-data-assets",
"redirect_document_id": false
},
{
"source_path_from_root": "/articles/machine-learning/how-to-access-data.md",
"redirect_url": "/azure/machine-learning/how-to-datastore",
"redirect_document_id": false
},
{
"source_path_from_root": "/articles/machine-learning/how-to-deploy-azure-container-instance.md",
"redirect_url": "/azure/machine-learning/v1/how-to-deploy-azure-container-instance",
Expand Down Expand Up @@ -43258,6 +43288,26 @@
"source_path_from_root": "/articles/cognitive-services/language-service/text-summarization/quickstart.md",
"redirect_url": "/azure/cognitive-services/language-service/summarization/quickstart",
"redirect_document_id": true
},
{
"source_path_from_root": "/articles/virtual-network/nat-gateway/tutorial-create-nat-gateway-portal.md",
"redirect_url": "/azure/virtual-network/nat-gateway/quickstart-create-nat-gateway-portal",
"redirect_document_id": true
},
{
"source_path_from_root": "/articles/virtual-network/nat-gateway/tutorial-create-nat-gateway-powershell.md",
"redirect_url": "/azure/virtual-network/nat-gateway/quickstart-create-nat-gateway-powershell",
"redirect_document_id": true
},
{
"source_path_from_root": "/articles/virtual-network/nat-gateway/tutorial-create-nat-gateway-cli.md",
"redirect_url": "/azure/virtual-network/nat-gateway/quickstart-create-nat-gateway-cli",
"redirect_document_id": true
},
{
"source_path_from_root": "/articles/aks/web-app-routing.md",
"redirect_url": "/azure/aks/intro-kubernetes",
"redirect_document_id":false
}
]
}
200 changes: 159 additions & 41 deletions articles/active-directory-b2c/partner-xid.md

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ services: active-directory
ms.service: active-directory
ms.subservice: authentication
ms.topic: conceptual
ms.date: 03/1/2022
ms.date: 05/24/2022

ms.author: justinha
author: justinha
Expand Down Expand Up @@ -73,6 +73,9 @@ Users can set one of the following options as the default Multi-Factor Authentic
- Phone call
- Text message

>[!NOTE]
>Virtual phone numbers are not supported for Voice calls or SMS messages.
Third party authenticator apps do not provide push notification. As we continue to add more authentication methods to Azure AD, those methods become available in combined registration.

## Combined registration modes
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -288,17 +288,10 @@ Make sure that enough DCs are patched to respond in time to service your resourc
> [!NOTE]
> The `/keylist` switch in the `nltest` command is available in client Windows 10 v2004 and later.
### What if I have a CloudTGT but it never gets exchange for a OnPremTGT when I am using Windows Hello for Business Cloud Trust?

Make sure that the user you are signed in as, is a member of the groups of users that can use FIDO2 as an authentication method, or enable it for all users.

> [!NOTE]
> Even if you are not explicitly using a security key to sign-in to your device, the underlying technology is dependent on the FIDO2 infrastructure requirements.
### Do FIDO2 security keys work in a Windows login with RODC present in the hybrid environment?

An FIDO2 Windows login looks for a writable DC to exchange the user TGT. As long as you have at least one writable DC per site, the login works fine.

## Next steps

[Learn more about passwordless authentication](concept-authentication-passwordless.md)
[Learn more about passwordless authentication](concept-authentication-passwordless.md)
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,7 @@ For more information about these authentication protocols and services, see [Sig

Before you can block legacy authentication in your directory, you need to first understand if your users have apps that use legacy authentication and how it affects your overall directory. Azure AD sign-in logs can be used to understand if you're using legacy authentication.

1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-ins**.
1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-in logs**.
1. Add the Client App column if it isn't shown by clicking on **Columns** > **Client App**.
1. **Add filters** > **Client App** > select all of the legacy authentication protocols. Select outside the filtering dialog box to apply your selections and close the dialog box.
1. If you've activated the [new sign-in activity reports preview](../reports-monitoring/concept-all-sign-ins.md), repeat the above steps also on the **User sign-ins (non-interactive)** tab.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ The Azure Active Directory (Azure AD) default configuration for user sign-in fre

It might sound alarming to not ask for a user to sign back in, in reality any violation of IT policies will revoke the session. Some examples include (but aren't limited to) a password change, an incompliant device, or account disable. You can also explicitly [revoke users’ sessions using PowerShell](/powershell/module/azuread/revoke-azureaduserallrefreshtoken). The Azure AD default configuration comes down to “don’t ask users to provide their credentials if security posture of their sessions hasn't changed”.

The sign-in frequency setting works with apps that have implemented OAUTH2 or OIDC protocols according to the standards. Most Microsoft native apps for Windows, Mac, and Mobile including the following web applications comply with the setting.
The sign-in frequency setting works with apps that have implemented OAuth2 or OIDC protocols according to the standards. Most Microsoft native apps for Windows, Mac, and Mobile including the following web applications comply with the setting.

- Word, Excel, PowerPoint Online
- OneNote Online
Expand All @@ -48,7 +48,7 @@ The sign-in frequency setting works with apps that have implemented OAUTH2 or OI
- Dynamics CRM Online
- Azure portal

The sign-in frequency setting works with SAML applications as well, as long as they don't drop their own cookies and are redirected back to Azure AD for authentication on regular basis.
The sign-in frequency setting works with 3rd party SAML applications and apps that have implemented OAuth2 or OIDC protocols, as long as they don't drop their own cookies and are redirected back to Azure AD for authentication on regular basis.

### User sign-in frequency and multi-factor authentication

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -77,6 +77,11 @@ https://login.microsoftonline.com/<issuer>/oauth2/v2.0/token

# NOTE: These are examples. Endpoint URI format may vary based on application type,
# sign-in audience, and Azure cloud instance (global or national cloud).

# The {issuer} value in the path of the request can be used to control who can sign into the application.
# The allowed values are **common** for both Microsoft accounts and work or school accounts,
# **organizations** for work or school accounts only, **consumers** for Microsoft accounts only,
# and **tenant identifiers** such as the tenant ID or domain name.
```

To find the endpoints for an application you've registered, in the [Azure portal](https://portal.azure.com) navigate to:
Expand Down
2 changes: 1 addition & 1 deletion articles/active-directory/develop/sample-v2-code.md
Original file line number Diff line number Diff line change
Expand Up @@ -108,7 +108,7 @@ The following samples show an application that accesses the Microsoft Graph API
> |.NET Core| &#8226; [Call Microsoft Graph](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/tree/master/1-Call-MSGraph) <br/> &#8226; [Call web API](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/tree/master/2-Call-OwnApi)<br/> &#8226; [Call own web API](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/tree/master/4-Call-OwnApi-Pop) <br/> &#8226; [Using managed identity and Azure key vault](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/tree/master/3-Using-KeyVault)| MSAL.NET | Client credentials grant|
> | ASP.NET|[Multi-tenant with Microsoft identity platform endpoint](https://github.com/Azure-Samples/ms-identity-aspnet-daemon-webapp) | MSAL.NET | Client credentials grant|
> | Java | &#8226; [Call Microsoft Graph with Secret](https://github.com/Azure-Samples/ms-identity-msal-java-samples/tree/main/1.%20Server-Side%20Scenarios/msal-client-credential-secret) <br/> &#8226; [Call Microsoft Graph with Certificate](https://github.com/Azure-Samples/ms-identity-msal-java-samples/tree/main/1.%20Server-Side%20Scenarios/msal-client-credential-certificate)| MSAL Java | Client credentials grant|
> | Node.js | [Sign in users and call web API](https://github.com/Azure-Samples/ms-identity-javascript-nodejs-console) | MSAL Node | Client credentials grant |
> | Node.js | [Call Microsoft Graph with secret](https://github.com/Azure-Samples/ms-identity-javascript-nodejs-console) | MSAL Node | Client credentials grant |
> | Python | &#8226; [Call Microsoft Graph with secret](https://github.com/Azure-Samples/ms-identity-python-daemon/tree/master/1-Call-MsGraph-WithSecret) <br/> &#8226; [Call Microsoft Graph with certificate](https://github.com/Azure-Samples/ms-identity-python-daemon/tree/master/2-Call-MsGraph-WithCertificate) | MSAL Python| Client credentials grant|
## Azure Functions as web APIs
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -117,7 +117,7 @@ You can create a web API from scratch by using Microsoft.Identity.Web project te

#### Starting from an existing ASP.NET Core 3.1 application

ASP.NET Core 3.1 uses the Microsoft.AspNetCore.AzureAD.UI library. The middleware is initialized in the Startup.cs file.
ASP.NET Core 3.1 uses the Microsoft.AspNetCore.Authentication.JwtBearer library. The middleware is initialized in the Startup.cs file.

```csharp
using Microsoft.AspNetCore.Authentication.JwtBearer;
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -93,7 +93,7 @@ You can put a subscription into the **Deprovisioned** state to be deleted in thr

If you have an Active or Cancelled Azure Subscription associated to your Azure AD Tenant then you would not be able to delete Azure AD Tenant. After you cancel, billing is stopped immediately. However, Microsoft waits 30 - 90 days before permanently deleting your data in case you need to access it or you change your mind. We don't charge you for keeping the data.

- If you have a free trial or pay-as-you-go subscription, you don't have to wait 90 days for the subscription to automatically delete. You can delete your subscription three days after you cancel it. The Delete subscription option isn't available until three days after you cancel your subscription. For more details please read through [Delete free trial or pay-as-you-go subscriptions](../../cost-management-billing/manage/cancel-azure-subscription.md#delete-free-trial-or-pay-as-you-go-subscriptions).
- If you have a free trial or pay-as-you-go subscription, you don't have to wait 90 days for the subscription to automatically delete. You can delete your subscription three days after you cancel it. The Delete subscription option isn't available until three days after you cancel your subscription. For more details please read through [Delete free trial or pay-as-you-go subscriptions](../../cost-management-billing/manage/cancel-azure-subscription.md#delete-subscriptions).
- All other subscription types are deleted only through the [subscription cancellation](../../cost-management-billing/manage/cancel-azure-subscription.md#cancel-subscription-in-the-azure-portal) process. In other words, you can't delete a subscription directly unless it's a free trial or pay-as-you-go subscription. However, after you cancel a subscription, you can create an [Azure support request](https://go.microsoft.com/fwlink/?linkid=2083458) to ask to have the subscription deleted immediately.
- Alternatively, you can also move/transfer the Azure subscription to another Azure AD tenant account. When you transfer billing ownership of your subscription to an account in another Azure AD tenant, you can move the subscription to the new account's tenant. Additionally, perfoming Switch Directory on the subscription would not help as the billing would still be aligned with Azure AD Tenant which was used to sign up for the subscription. For more information review [Transfer a subscription to another Azure AD tenant account](../../cost-management-billing/manage/billing-subscription-transfer.md#transfer-a-subscription-to-another-azure-ad-tenant-account)

Expand Down Expand Up @@ -156,4 +156,4 @@ You can put a self-service sign-up product like Microsoft Power BI or Azure Righ

## Next steps

[Azure Active Directory documentation](../index.yml)
[Azure Active Directory documentation](../index.yml)
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ B2B direct connect requires a mutual trust relationship between two Azure AD org

Currently, B2B direct connect capabilities work with Teams shared channels. When B2B direct connect is established between two organizations, users in one organization can create a shared channel in Teams and invite an external B2B direct connect user to it. Then from within Teams, the B2B direct connect user can seamlessly access the shared channel in their home tenant Teams instance, without having to manually sign in to the organization hosting the shared channel.

For licensing and pricing information related to B2B direct connect users, refer to [Azure Active Directory pricing](https://azure.microsoft.com/pricing/details/active-directory/).
For licensing and pricing information related to B2B direct connect users, refer to [Azure Active Directory External Identities pricing](https://azure.microsoft.com/pricing/details/active-directory/external-identities/).

## Managing cross-tenant access for B2B direct connect

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ This article helps you to add and remove a group from another group using Azure
You can add an existing Security group to another existing Security group (also known as nested groups), creating a member group (subgroup) and a parent group. The member group inherits the attributes and properties of the parent group, saving you configuration time.

>[!Important]
>We don't currently support:<ul><li>Adding groups to a group synced with on-premises Active Directory.</li><li>Adding Security groups to Microsoft 365 groups.</li><li>Adding Microsoft 365 groups to Security groups or other Microsoft 365 groups.</li><li>Assigning apps to nested groups.</li><li>Applying licenses to nested groups.</li><li>Adding distribution groups in nesting scenarios.</li><li> Adding security groups as members of mail-enabled security groups</li></ul>
>We don't currently support:<ul><li>Adding groups to a group synced with on-premises Active Directory.</li><li>Adding Security groups to Microsoft 365 groups.</li><li>Adding Microsoft 365 groups to Security groups or other Microsoft 365 groups.</li><li>Assigning apps to nested groups.</li><li>Applying licenses to nested groups.</li><li>Adding distribution groups in nesting scenarios.</li><li>Adding security groups as members of mail-enabled security groups</li><li> Adding groups as members of a role-assignable group.</li></ul>
### To add a group as a member of another group

Expand Down
4 changes: 3 additions & 1 deletion articles/active-directory/fundamentals/add-custom-domain.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,8 @@ After you create your directory, you can add your custom domain name.

>[!IMPORTANT]
>You must include *.com*, *.net*, or any other top-level extension for this to work properly.
>
>When adding a custom domain, the Password Policy values will be inherited from the initial domain.
The unverified domain is added. The **contoso.com** page appears showing your DNS information. Save this information. You need it later to create a TXT record to configure DNS.

Expand Down Expand Up @@ -114,4 +116,4 @@ If Azure AD can't verify a custom domain name, try the following suggestions:

- Manage your domain name information in Azure AD. For more information, see [Managing custom domain names](../enterprise-users/domains-manage.md).

- If you have on-premises versions of Windows Server that you want to use alongside Azure Active Directory, see [Integrate your on-premises directories with Azure Active Directory](../hybrid/whatis-hybrid-identity.md).
- If you have on-premises versions of Windows Server that you want to use alongside Azure Active Directory, see [Integrate your on-premises directories with Azure Active Directory](../hybrid/whatis-hybrid-identity.md).
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ Today, the majority of all compromising sign-in attempts come from legacy authen

Before you can block legacy authentication in your directory, you need to first understand if your users have apps that use legacy authentication and how it affects your overall directory. Azure AD sign-in logs can be used to understand if you're using legacy authentication.

1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-ins**.
1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-in logs**.
1. Add the **Client App** column if it is not shown by clicking on **Columns** > **Client App**.
1. Filter by **Client App** > check all the **Legacy Authentication Clients** options presented.
1. Filter by **Status** > **Success**.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,9 @@ To ensure people outside of your organization can request access packages and ge
- For more information about Azure AD B2B external collaboration settings, see [Configure external collaboration settings](../external-identities/external-collaboration-settings-configure.md).

![Azure AD external collaboration settings](./media/entitlement-management-external-users/collaboration-settings.png)

> [!NOTE]
> If you create a connected organization for an Azure AD tenant from a different Microsoft cloud, you also need to configure cross-tenant access settings appropriately. For more information on how to configure these settings, see [Configure cross-tenant access settings](../external-identities/cross-cloud-settings.md).
### Review your Conditional Access policies

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ A connected organization is another organization that you have a relationship wi

There are three ways that entitlement management lets you specify the users that form a connected organization. It could be

* users in another Azure AD directory,
* users in another Azure AD directory (from any Microsoft cloud),
* users in another non-Azure AD directory that has been configured for direct federation, or
* users in another non-Azure AD directory, whose email addresses all have the same domain name in common.

Expand Down
Loading

0 comments on commit 6a9f84e

Please sign in to comment.