Skip to content

Commit ab8891a

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into release-ga-pnp
2 parents 6d182a2 + ee7ade9 commit ab8891a

File tree

627 files changed

+5469
-2658
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

627 files changed

+5469
-2658
lines changed

.openpublishing.redirection.json

+10
Original file line numberDiff line numberDiff line change
@@ -1521,6 +1521,11 @@
15211521
"redirect_url": "/azure/machine-learning/how-to-deploy-inferencing-gpus",
15221522
"redirect_document_id": false
15231523
},
1524+
{
1525+
"source_path": "articles/machine-learning/how-to-train-ml-models.md",
1526+
"redirect_url": "/azure/machine-learning/how-to-set-up-training-targets",
1527+
"redirect_document_id": false
1528+
},
15241529
{
15251530
"source_path": "articles/open-datasets/tutorial-opendatasets-automl.md",
15261531
"redirect_url": "/azure/machine-learning/tutorial-auto-train-models",
@@ -20787,6 +20792,11 @@
2078720792
"redirect_url": "/azure/load-balancer/load-balancer-get-started-internet-portal",
2078820793
"redirect_document_id": false
2078920794
},
20795+
{
20796+
"source_path": "articles/load-balancer/load-balancer-security-controls.md",
20797+
"redirect_url": "/azure/load-balancer/security-baseline",
20798+
"redirect_document_id": false
20799+
},
2079020800
{
2079120801
"source_path": "articles/load-balancer/load-balancer-configure-sqlao.md",
2079220802
"redirect_url": "/azure/virtual-machines/windows/sql/virtual-machines-windows-portal-sql-alwayson-int-listener",

articles/active-directory-b2c/conditional-access-technical-profile.md

+9-14
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ The following example shows a Conditional Access technical profile that is used
8888
<Item Key="OperationType">Evaluation</Item>
8989
</Metadata>
9090
<InputClaimsTransformations>
91-
<InputClaimsTransformation ReferenceId="IsMfaRegistered" />
91+
<InputClaimsTransformation ReferenceId="IsMfaRegisteredCT" />
9292
</InputClaimsTransformations>
9393
<InputClaims>
9494
<InputClaim ClaimTypeReferenceId="objectId" PartnerClaimType="UserId" />
@@ -363,6 +363,7 @@ In your TrustFrameworkPolicy element, add these SubJourneys as shown in the foll
363363
</OrchestrationStep>
364364
</OrchestrationSteps>
365365
</SubJourney>
366+
</SubJourneys>
366367

367368
```
368369

@@ -372,7 +373,7 @@ Add a user journey that uses the new claims, as shown in the following example:
372373
<UserJourneys>
373374
<UserJourney Id="SignUpOrSignInWithCA">
374375
<OrchestrationSteps>
375-
<OrchestrationStep Order="1" Type="CombinedSignInAndSignUp" ContentDefinitionReferenceId="api.signuporsigninsam">
376+
<OrchestrationStep Order="1" Type="CombinedSignInAndSignUp" ContentDefinitionReferenceId="api.signuporsignin">
376377
<ClaimsProviderSelections>
377378
<ClaimsProviderSelection ValidationClaimsExchangeId="LocalAccountSigninEmailExchange" />
378379

@@ -408,20 +409,14 @@ Add a user journey that uses the new claims, as shown in the following example:
408409
</ClaimsExchanges>
409410
</OrchestrationStep>
410411

411-
<OrchestrationStep Order="4" Type="ClaimsExchange">
412-
<ClaimsExchanges>
413-
<ClaimsExchange Id="UserJourneyContext" TechnicalProfileReferenceId="SimpleUJContext" />
414-
</ClaimsExchanges>
415-
</OrchestrationStep>
416-
417-
<OrchestrationStep Order="5" Type="InvokeSubJourney">
412+
<OrchestrationStep Order="4" Type="InvokeSubJourney">
418413
<JourneyList>
419414
<Candidate SubJourneyReferenceId="ConditionalAccess_Evaluation" />
420415
</JourneyList>
421416
</OrchestrationStep>
422417

423418
<!--MFA based on Conditional Access-->
424-
<OrchestrationStep Order="6" Type="ClaimsExchange">
419+
<OrchestrationStep Order="5" Type="ClaimsExchange">
425420
<Preconditions>
426421
<Precondition Type="ClaimsExist" ExecuteActionsIf="false">
427422
<Value>CAChallengeIsMfa</Value>
@@ -439,7 +434,7 @@ Add a user journey that uses the new claims, as shown in the following example:
439434
</OrchestrationStep>
440435

441436
<!--Save MFA phone number: The precondition verifies whether the user provided a new number in the previous step. If so, the phone number is stored in the directory for future authentication requests.-->
442-
<OrchestrationStep Order="7" Type="ClaimsExchange">
437+
<OrchestrationStep Order="6" Type="ClaimsExchange">
443438
<Preconditions>
444439
<Precondition Type="ClaimsExist" ExecuteActionsIf="false">
445440
<Value>newPhoneNumberEntered</Value>
@@ -451,7 +446,7 @@ Add a user journey that uses the new claims, as shown in the following example:
451446
</ClaimsExchanges>
452447
</OrchestrationStep>
453448

454-
<OrchestrationStep Order="8" Type="ClaimsExchange" >
449+
<OrchestrationStep Order="7" Type="ClaimsExchange" >
455450
<Preconditions>
456451
<Precondition Type="ClaimsExist" ExecuteActionsIf="false">
457452
<Value>CAChallengeIsBlock</Value>
@@ -470,12 +465,12 @@ Add a user journey that uses the new claims, as shown in the following example:
470465

471466
<!--If a user has reached this point, this means a remediation was applied-->
472467
<!-- You can add a precondition here to call remediation only if a Conditional Access challenge was issued-->
473-
<OrchestrationStep Order="9" Type="InvokeSubJourney">
468+
<OrchestrationStep Order="8" Type="InvokeSubJourney">
474469
<JourneyList>
475470
<Candidate SubJourneyReferenceId="ConditionalAccess_Remediation" />
476471
</JourneyList>
477472
</OrchestrationStep>
478-
<OrchestrationStep Order="10" Type="SendClaims" CpimIssuerTechnicalProfileReferenceId="JwtIssuer" />
473+
<OrchestrationStep Order="9" Type="SendClaims" CpimIssuerTechnicalProfileReferenceId="JwtIssuer" />
479474
</OrchestrationSteps>
480475
<ClientDefinition ReferenceId="DefaultWeb" />
481476
</UserJourney>

articles/active-directory-domain-services/powershell-create-instance.md

+54
Original file line numberDiff line numberDiff line change
@@ -285,6 +285,60 @@ $Vnet=New-AzVirtualNetwork `
285285
-Name $VnetName `
286286
-AddressPrefix 10.0.0.0/16 `
287287
-Subnet $AaddsSubnet,$WorkloadSubnet
288+
289+
$NSGName = "aaddsNSG"
290+
291+
# Create a rule to allow inbound TCP port 443 traffic for synchronization with Azure AD
292+
$nsg101 = New-AzNetworkSecurityRuleConfig `
293+
-Name AllowSyncWithAzureAD `
294+
-Access Allow `
295+
-Protocol Tcp `
296+
-Direction Inbound `
297+
-Priority 101 `
298+
-SourceAddressPrefix AzureActiveDirectoryDomainServices `
299+
-SourcePortRange * `
300+
-DestinationAddressPrefix * `
301+
-DestinationPortRange 443
302+
303+
# Create a rule to allow inbound TCP port 3389 traffic from Microsoft secure access workstations for troubleshooting
304+
$nsg201 = New-AzNetworkSecurityRuleConfig -Name AllowRD `
305+
-Access Allow `
306+
-Protocol Tcp `
307+
-Direction Inbound `
308+
-Priority 201 `
309+
-SourceAddressPrefix CorpNetSaw `
310+
-SourcePortRange * `
311+
-DestinationAddressPrefix * `
312+
-DestinationPortRange 3389
313+
314+
# Create a rule to allow TCP port 5986 traffic for PowerShell remote management
315+
$nsg301 = New-AzNetworkSecurityRuleConfig -Name AllowPSRemoting `
316+
-Access Allow `
317+
-Protocol Tcp `
318+
-Direction Inbound `
319+
-Priority 301 `
320+
-SourceAddressPrefix AzureActiveDirectoryDomainServices `
321+
-SourcePortRange * `
322+
-DestinationAddressPrefix * `
323+
-DestinationPortRange 5986
324+
325+
# Create the network security group and rules
326+
$nsg = New-AzNetworkSecurityGroup -Name $NSGName `
327+
-ResourceGroupName $ResourceGroupName `
328+
-Location $AzureLocation `
329+
-SecurityRules $nsg101,$nsg201,$nsg301
330+
331+
# Get the existing virtual network resource objects and information
332+
$vnet = Get-AzVirtualNetwork -Name $VnetName
333+
$subnet = Get-AzVirtualNetworkSubnetConfig -VirtualNetwork $vnet -Name $SubnetName
334+
$addressPrefix = $subnet.AddressPrefix
335+
336+
# Associate the network security group with the virtual network subnet
337+
Set-AzVirtualNetworkSubnetConfig -Name $SubnetName `
338+
-VirtualNetwork $vnet `
339+
-AddressPrefix $addressPrefix `
340+
-NetworkSecurityGroup $nsg
341+
$vnet | Set-AzVirtualNetwork
288342
289343
# Enable Azure AD Domain Services for the directory.
290344
New-AzResource -ResourceId "/subscriptions/$AzureSubscriptionId/resourceGroups/$ResourceGroupName/providers/Microsoft.AAD/DomainServices/$ManagedDomainName" `

articles/active-directory/authentication/concept-sspr-policy.md

+3-1
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The following password policy options are defined:
5858

5959
## Administrator reset policy differences
6060

61-
Microsoft enforces a strong default *two-gate* password reset policy for any Azure administrator role. This policy may be different from the one you have defined for your users, and this policy can't be changed. You should always test password reset functionality as a user without any Azure administrator roles assigned.
61+
By default, administrator accounts are enabled for self-service password reset, and a strong default *two-gate* password reset policy is enforced. This policy may be different from the one you have defined for your users, and this policy can't be changed. You should always test password reset functionality as a user without any Azure administrator roles assigned.
6262

6363
With a two-gate policy, administrators don't have the ability to use security questions.
6464

@@ -91,6 +91,8 @@ The two-gate policy requires two pieces of authentication data, such as an email
9191
* A custom domain has been configured for your Azure AD tenant, such as *contoso.com*; or
9292
* Azure AD Connect is synchronizing identities from your on-premises directory
9393

94+
You can disable the use of SSPR for administrator accounts using the [Set-MsolCompanySettings](/powershell/module/msonline/set-msolcompanysettings?view=azureadps-1.0) PowerShell cmdlet. The `-SelfServePasswordResetEnabled $False` parameter disables SSPR for administrators.
95+
9496
### Exceptions
9597

9698
A one-gate policy requires one piece of authentication data, such as an email address or phone number. A one-gate policy applies in the following circumstances:

articles/active-directory/authentication/howto-mfa-mfasettings.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ To configure account lockout settings, complete the following settings:
5454

5555
## Block and unblock users
5656

57-
If a user's device has been lost or stolen, you can block authentication attempts for the associated account. Any authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they are blocked.
57+
If a user's device has been lost or stolen, you can block Azure Multi-Factor Authentication attempts for the associated account. Any Azure Multi-Factor Authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they are blocked.
5858

5959
### Block a user
6060

@@ -82,7 +82,7 @@ The fraud alert feature lets users report fraudulent attempts to access their re
8282

8383
The following fraud alert configuration options are available:
8484

85-
* **Automatically block users who report fraud**: If a user reports fraud, their account is blocked for 90 days or until an administrator unblocks their account. An administrator can review sign-ins by using the sign-in report, and take appropriate action to prevent future fraud. An administrator can then [unblock](#unblock-a-user) the user's account.
85+
* **Automatically block users who report fraud**: If a user reports fraud, the Azure MFA authentication attempts for the user account are blocked for 90 days or until an administrator unblocks their account. An administrator can review sign-ins by using the sign-in report, and take appropriate action to prevent future fraud. An administrator can then [unblock](#unblock-a-user) the user's account.
8686
* **Code to report fraud during initial greeting**: When users receive a phone call to perform multi-factor authentication, they normally press **#** to confirm their sign-in. To report fraud, the user enters a code before pressing **#**. This code is **0** by default, but you can customize it.
8787

8888
> [!NOTE]

articles/active-directory/authentication/tutorial-enable-sspr.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ If users need additional help with the SSPR process, you can customize the link
115115
With SSPR enabled and configured, test the SSPR process with a user that's part of the group you selected in the previous section, such as *Test-SSPR-Group*. In the following example, the *testuser* account is used. Provide your own user account that's part of the group you enabled for SSPR in the first section of this tutorial.
116116

117117
> [!NOTE]
118-
> When you test the self-service password reset, use a non-administrator account. Admins are always enabled for self-service password reset and are required to use two authentication methods to reset their password.
118+
> When you test self-service password reset, use a non-administrator account. By default, admins are enabled for self-service password reset and are required to use two authentication methods to reset their password. For more information, see [Administrator reset policy differences](concept-sspr-policy.md#administrator-reset-policy-differences).
119119
120120
1. To see the manual registration process, open a new browser window in InPrivate or incognito mode, and browse to [https://aka.ms/ssprsetup](https://aka.ms/ssprsetup). Users should be directed to this registration portal when they next sign-in.
121121
1. Sign in with a non-administrator test user, such as *testuser*, and register your authentication methods contact information.

articles/active-directory/develop/app-objects-and-service-principals.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ To access resources that are secured by an Azure AD tenant, the entity that requ
4545

4646
A service principal is the local representation, or application instance, of a global application object in a single tenant or directory. A service principal is a concrete instance created from the application object and inherits certain properties from that application object. A service principal is created in each tenant where the application is used and references the globally unique app object. The service principal object defines what the app can actually do in the specific tenant, who can access the app, and what resources the app can access.
4747

48-
When an application is given permission to access resources in a tenant (upon registration or [consent](developer-glossary.md#consent)), a service principal object is created. You can also create service principal object in a tenant using [Azure PowerShell](howto-authenticate-service-principal-powershell.md), Azure CLI, [Microsoft Graph](/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http), the [Azure portal][AZURE-Portal], and other tools. When using the portal, a service principal is created automatically when you register an application.
48+
When an application is given permission to access resources in a tenant (upon registration or [consent](developer-glossary.md#consent)), a service principal object is created. You can also create service principal object in a tenant using [Azure PowerShell](howto-authenticate-service-principal-powershell.md), [Azure CLI](/cli/azure/create-an-azure-service-principal-azure-cli?view=azure-cli-latest), [Microsoft Graph](/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http), the [Azure portal][AZURE-Portal], and other tools. When using the portal, a service principal is created automatically when you register an application.
4949

5050
The **Enterprise applications** blade in the portal is used to list and manage the service principals in a tenant. You can see the service principal's permissions, user consented permissions, which users have done that consent, sign in information, and more.
5151

articles/active-directory/develop/v2-permissions-and-consent.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ ms.workload: identity
1111
ms.topic: conceptual
1212
ms.date: 09/23/2020
1313
ms.author: ryanwi
14-
ms.reviewer: hirsin, jesakowi, jmprieur
15-
ms.custom: aaddev, fasttrack-edit
14+
ms.reviewer: hirsin, jesakowi, jmprieur, marsma
15+
ms.custom: aaddev, fasttrack-edit, contperfq1
1616
---
1717

1818
# Permissions and consent in the Microsoft identity platform endpoint

articles/active-directory/devices/concept-primary-refresh-token.md

+3
Original file line numberDiff line numberDiff line change
@@ -197,6 +197,9 @@ The following diagrams illustrate the underlying details in issuing, renewing, a
197197
| E | The native client host will return this PRT cookie to the browser, which will include it as part of the request header called x-ms-RefreshTokenCredential and request tokens from Azure AD. |
198198
| F | Azure AD validates the Session key signature on the PRT cookie, validates the nonce, verifies that the device is valid in the tenant, and issues an ID token for the web page and an encrypted session cookie for the browser. |
199199

200+
> [!NOTE]
201+
> The Browser SSO flow described in the steps above does not apply for sessions in private modes such as InPrivate in Microsoft Edge, or Incognito in Google Chrome (when using the Microsoft Accounts extension).
202+
200203
## Next steps
201204

202205
For more information on troubleshooting PRT-related issues, see the article [Troubleshooting hybrid Azure Active Directory joined Windows 10 and Windows Server 2016 devices](troubleshoot-hybrid-join-windows-current.md).

articles/active-directory/external-identities/invitation-email-elements.md

+16-2
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 04/15/2020
9+
ms.date: 09/28/2020
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -72,7 +72,21 @@ The next section of the email contains information about where the invitee will
7272
The footer contains more information about the invitation being sent. There is always an option for the invitee to block future invitations. If the organization has [set a privacy statement](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-properties-area), the link to the statement is displayed here. Otherwise, a note indicates the organization hasn't set a privacy statement.
7373

7474
![Image of the footer section in the email](media/invitation-email-elements/footer-section.png)
75-
75+
76+
### Blocking an organization (unsubscribing)
77+
78+
In the invitation from an organization, the footer contains an option to **Block future invitations**. A guest user can select this link to block any future invitations from the organization. This action also adds the organization to the user's unsubscribed list at [https://invitations.microsoft.com/unsubscribe/manage](https://invitations.microsoft.com/unsubscribe/manage).
79+
80+
### Viewing organizations you've blocked
81+
82+
A guest user can follow these steps to view or export the organizations they've blocked:
83+
84+
1. Go to [https://invitations.microsoft.com/unsubscribe/manage](https://invitations.microsoft.com/unsubscribe/manage).
85+
2. Enter your email and follow the sign-in steps for email one-time passcode authentication.
86+
3. View the organizations you've blocked, or export the names using copy and paste.
87+
> [!NOTE]
88+
> If you want to allow an organization you’ve blocked to invite you again, you can choose the organization and select **Next**.
89+
7690
## How the language is determined
7791

7892
The language presented to the guest user in the invitation email is determined by the following settings. These settings are listed in order of precedence. If a setting isn’t configured, the next setting in the list determines the language.

0 commit comments

Comments
 (0)