Skip to content

Commit 62dcab6

Browse files
committed
Merge remote-tracking branch 'upstream/master'
2 parents 86b77c9 + eebefb2 commit 62dcab6

File tree

982 files changed

+41691
-40778
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

982 files changed

+41691
-40778
lines changed

.openpublishing.redirection.json

+15
Original file line numberDiff line numberDiff line change
@@ -30656,6 +30656,11 @@
3065630656
"redirect_url": "/azure/active-directory/b2b/what-is-b2b",
3065730657
"redirect_document_id": true
3065830658
},
30659+
{
30660+
"source_path": "articles/active-directory/b2b/b2b-tutorial-bulk-invite.md",
30661+
"redirect_url": "/azure/active-directory/b2b/tutorial-bulk-invite",
30662+
"redirect_document_id": false
30663+
},
3065930664
{
3066030665
"source_path": "articles/security/manage-personal-data-azure.md",
3066130666
"redirect_url": "/azure/security",
@@ -35400,6 +35405,11 @@
3540035405
"redirect_url": "/azure/storage/common/storage-lifecycle-management-concepts",
3540135406
"redirect_document_id": true
3540235407
},
35408+
{
35409+
"source_path": "articles/storage/common/storage-enable-and-view-metrics.md",
35410+
"redirect_url": "/azure/storage/common/storage-metrics-in-azure-monitor",
35411+
"redirect_document_id": true
35412+
},
3540335413
{
3540435414
"source_path": "articles/azure-stack/partner/azure-stack-vaas-set-up-account.md",
3540535415
"redirect_url": "/azure/azure-stack/partner/azure-stack-vaas-set-up-resources",
@@ -36905,6 +36915,11 @@
3690536915
"source_path": "articles/cognitive-services/QnAMaker/How-To/publish-knowledge-base.md",
3690636916
"redirect_url": "/azure/cognitive-services/QnAMaker/quickstarts/create-publish-knowledge-base",
3690736917
"redirect_document_id": true
36918+
},
36919+
{
36920+
"source_path": "articles/cognitive-services/LUIS/luis-quickstart-intent-and-hier-entity.md",
36921+
"redirect_url": "/azure/cognitive-services/LUIS/tutorial-entity-roles",
36922+
"redirect_document_id": true
3690836923
}
3690936924
]
3691036925
}

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

+2
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,8 @@ Before combined registration, users registered authentication methods for Azure
2323

2424
Before enabling the new experience, review this administrator-focused documentation and the user-focused documentation to ensure you understand the functionality and effect of this feature. Base your training on the user documentation to prepare your users for the new experience and help to ensure a successful rollout.
2525

26+
Azure AD combined security information registration is not currently available to national clouds like Azure US Government, Azure Germany, or Azure China 21Vianet.
27+
2628
| |
2729
| --- |
2830
| Combined security information registration for Multi-Factor Authentication and Azure Active Directory (Azure AD) self-service password reset is a public preview feature of Azure AD. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).|

articles/active-directory/authentication/howto-mfaserver-adfs-2012.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ At this point, Multi-Factor Authentication Server is set up to be an additional
7878
Follow these steps to edit the MultiFactorAuthenticationAdfsAdapter.config file:
7979

8080
1. Set the **UseWebServiceSdk** node to **true**.
81-
2. Set the value for **WebServiceSdkUrl** to the URL of the Multi-Factor Authentication Web Service SDK. For example: *<https://contoso.com/&lt;certificatename&gt;/MultiFactorAuthWebServiceSdk/PfWsSdk.asmx>*, Where *certificatename* is the name of your certificate.
81+
2. Set the value for **WebServiceSdkUrl** to the URL of the Multi-Factor Authentication Web Service SDK. For example: *https:\/\/contoso.com/\<certificatename>/MultiFactorAuthWebServiceSdk/PfWsSdk.asmx*, Where *\<certificatename>* is the name of your certificate.
8282
3. Edit the Register-MultiFactorAuthenticationAdfsAdapter.ps1 script by adding `-ConfigurationFilePath &lt;path&gt;` to the end of the `Register-AdfsAuthenticationProvider` command, where *&lt;path&gt;* is the full path to the MultiFactorAuthenticationAdfsAdapter.config file.
8383

8484
### Configure the Web Service SDK with a username and password

articles/active-directory/authentication/howto-registration-mfa-sspr-combined-troubleshoot.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ In a PowerShell window, run the following command, providing the script and user
151151

152152
To disable the preview experience for your users, complete these steps:
153153

154-
1. Sign in to the Azure portal as a global administrator or user administrator.
154+
1. Sign in to the Azure portal as a user administrator.
155155
2. Go to **Azure Active Directory** > **User settings** > **Manage settings for access panel preview features**.
156156
3. Under **Users can use preview features for registering and managing security info**, set the selector to **None**, and then select **Save**.
157157

articles/active-directory/authentication/howto-sspr-reporting.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ The following list explains this activity in detail:
115115
The following list explains this activity in detail:
116116

117117
* **Activity description**: Indicates that an administrator performed a password reset on behalf of a user from the Azure portal.
118-
* **Activity actor**: The administrator who performed the password reset on behalf of another end user or administrator. Must be either a global administrator, password administrator, user administrator, or helpdesk administrator.
118+
* **Activity actor**: The administrator who performed the password reset on behalf of another end user or administrator. Must be a password administrator, user administrator, or helpdesk administrator.
119119
* **Activity target**: The user whose password was reset. The user can be an end user or a different administrator.
120120
* **Activity statuses**:
121121
* _Success_: Indicates that an admin successfully reset a user's password.

articles/active-directory/b2b/add-users-administrator.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -7,19 +7,19 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: conceptual
10-
ms.date: 2/6/2019
10+
ms.date: 04/10/2019
1111

1212
ms.author: mimart
1313
author: msmimart
14-
manager: daveba
14+
manager: celested
1515
ms.reviewer: mal
1616

1717
ms.collection: M365-identity-device-management
1818
---
1919

2020
# Add Azure Active Directory B2B collaboration users in the Azure portal
2121

22-
As a global administrator, or a user who is assigned any of the limited administrator directory roles, you can use the Azure portal to invite B2B collaboration users. You can invite guest users to the directory, to a group, or to an application. After you invite a user through any of these methods, the invited user's account is added to Azure Active Directory (Azure AD), with a user type of *Guest*. The guest user must then redeem their invitation to access resources.
22+
As a user who is assigned any of the limited administrator directory roles, you can use the Azure portal to invite B2B collaboration users. You can invite guest users to the directory, to a group, or to an application. After you invite a user through any of these methods, the invited user's account is added to Azure Active Directory (Azure AD), with a user type of *Guest*. The guest user must then redeem their invitation to access resources.
2323

2424
After you add a guest user to the directory, you can either send the guest user a direct link to a shared app, or the guest user can click the redemption URL in the invitation email. For more information about the redemption process, see [B2B collaboration invitation redemption](redemption-experience.md).
2525

@@ -30,7 +30,7 @@ After you add a guest user to the directory, you can either send the guest user
3030

3131
To add B2B collaboration users to the directory, follow these steps:
3232

33-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
33+
1. Sign in to the [Azure portal](https://portal.azure.com) as a user who is assigned any of the limited administrator directory roles.
3434
2. In the navigation pane, select **Azure Active Directory**.
3535
3. Under **Manage**, select **Users**.
3636
4. Select **New guest user**.

articles/active-directory/b2b/b2b-tutorial-bulk-invite.md

-141
This file was deleted.

articles/active-directory/b2b/b2b-tutorial-require-mfa.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,11 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: tutorial
9-
ms.date: 06/25/2018
9+
ms.date: 04/10/2019
1010

1111
ms.author: mimart
1212
author: msmimart
13-
manager: daveba
13+
manager: celested
1414
ms.reviewer: mal
1515
ms.custom: "it-pro, seo-update-azuread-jan"
1616
ms.collection: M365-identity-device-management
@@ -69,7 +69,7 @@ To complete the scenario in this tutorial, you need:
6969
3. Sign out.
7070

7171
## Create a conditional access policy that requires MFA
72-
1. Sign in to your [Azure portal](https://portal.azure.com/) as global administrator, security administrator, or a conditional access administrator.
72+
1. Sign in to your [Azure portal](https://portal.azure.com/) as a security administrator or a conditional access administrator.
7373
2. In the Azure portal, select **Azure Active Directory**.
7474
3. On the **Azure Active Directory** page, in the **Security** section, select **Conditional access**.
7575
4. On the **Conditional Access** page, in the toolbar on the top, select **New policy**.

articles/active-directory/b2b/faq.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: reference
9-
ms.date: 04/02/2019
9+
ms.date: 04/10/2019
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -51,7 +51,7 @@ Yes. Guest objects aren't visible in your organization's global address list (GA
5151
Absolutely. For more information, see [Adding guest users to a role](add-guest-to-role.md).
5252

5353
### Does Azure AD B2B collaboration allow B2B users to access the Azure portal?
54-
Unless a user is assigned the role of limited administrator or global administrator, B2B collaboration users won't require access to the Azure portal. However, B2B collaboration users who are assigned the role of limited administrator or global administrator can access the portal. Also, if a guest user who isn't assigned one of these admin roles accesses the portal, the user might be able to access certain parts of the experience. The guest user role has some permissions in the directory.
54+
Unless a user is assigned the role of limited administrator, B2B collaboration users won't require access to the Azure portal. However, B2B collaboration users who are assigned the role of limited administrator can access the portal. Also, if a guest user who isn't assigned one of these admin roles accesses the portal, the user might be able to access certain parts of the experience. The guest user role has some permissions in the directory.
5555

5656
### Can I block access to the Azure portal for guest users?
5757
Yes! When you configure this policy, be careful to avoid accidentally blocking access to members and admins.

0 commit comments

Comments
 (0)