Skip to content

Commit 0105c1c

Browse files
author
Shantanu Gudihal
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into sarah-doc-request-2399
2 parents 8693415 + 52229d7 commit 0105c1c

File tree

431 files changed

+4395
-2644
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

431 files changed

+4395
-2644
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4371,6 +4371,11 @@
43714371
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",
43724372
"redirect_document_id": false
43734373
},
4374+
{
4375+
"source_path_from_root": "/articles/active-directory/reports-monitoring/workbook-legacy authentication.md",
4376+
"redirect_url": "/azure/active-directory/reports-monitoring/workbook-legacy-authentication",
4377+
"redirect_document_id": false
4378+
},
43744379
{
43754380
"source_path_from_root": "/articles/active-directory/reports-monitoring/troubleshoot-missing-audit-data.md",
43764381
"redirect_url": "/azure/active-directory/reports-monitoring/reports-faq",

.openpublishing.redirection.healthcare-apis.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -610,11 +610,15 @@
610610
"redirect_document_id": false
611611
},
612612
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-troubleshoot-error-messages-and-conditions.md",
613-
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-error-messages-and-conditions",
613+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
614+
"redirect_document_id": false
615+
},
616+
{ "source_path_from_root": "/articles/healthcare-apis/iot/troubleshoot-error-messages-and-conditions.md",
617+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
614618
"redirect_document_id": false
615619
},
616620
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-troubleshoot-mappings.md",
617-
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-mappings",
621+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
618622
"redirect_document_id": false
619623
},
620624
{ "source_path_from_root": "/articles/healthcare-apis/iot/iot-connector-faqs.md",
@@ -637,6 +641,10 @@
637641
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-arm",
638642
"redirect_document_id": false
639643
},
644+
{ "source_path_from_root": "/articles/healthcare-apis/iot/troubleshoot-mappings.md",
645+
"redirect_url": "/azure/healthcare-apis/iot/troubleshoot-errors",
646+
"redirect_document_id": false
647+
},
640648
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
641649
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
642650
"redirect_document_id": false

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ For every user in SuccessFactors, Azure AD provisioning service retrieves the fo
7171
| 26 | Manager User | employmentNav/jobInfoNav/managerUserNav | Only if `managerUserNav` is mapped |
7272

7373
## How full sync works
74-
Based on the attribute-mapping, during full sync Azure AD provisioning service sends the following "GET" OData API query to fetch effective data of all active users.
74+
Based on the attribute-mapping, during full sync Azure AD provisioning service sends the following "GET" OData API query to fetch effective data of all active and terminated workers.
7575

7676
> [!div class="mx-tdCol2BreakAll"]
7777
>| Parameter | Description |
@@ -216,9 +216,11 @@ Extending this scenario:
216216

217217
### Mapping employment status to account status
218218

219-
By default, the Azure AD SuccessFactors connector uses the `activeEmploymentsCount` field of the `PersonEmpTerminationInfo` object to set account status. There is a known SAP SuccessFactors issue documented in [knowledge base article 3047486](https://launchpad.support.sap.com/#/notes/3047486) that at times this may disable the account of a terminated worker one day prior to the termination on the last day of work.
219+
By default, the Azure AD SuccessFactors connector uses the `activeEmploymentsCount` field of the `PersonEmpTerminationInfo` object to set account status. You may encounter one of the following issues with this attribute.
220+
1. There is a known SAP SuccessFactors issue documented in [knowledge base article 3047486](https://launchpad.support.sap.com/#/notes/3047486) that at times this may disable the account of a terminated worker one day prior to the termination on the last day of work.
221+
1. If the `PersonEmpTerminationInfo` object gets set to null, during termination, then AD account disabling will not work, as the provisioning engine filters out records where `personEmpTerminationInfoNav` object is set to null.
220222

221-
If you are running into this issue or prefer mapping employment status to account status, you can update the mapping to expand the `emplStatus` field and use the employment status code present in the field `emplStatus.externalCode`. Based on [SAP support note 2505526](https://launchpad.support.sap.com/#/notes/2505526), here is a list of employment status codes that you can retrieve in the provisioning app.
223+
If you are running into any of these issues or prefer mapping employment status to account status, you can update the mapping to expand the `emplStatus` field and use the employment status code present in the field `emplStatus.externalCode`. Based on [SAP support note 2505526](https://launchpad.support.sap.com/#/notes/2505526), here is a list of employment status codes that you can retrieve in the provisioning app.
222224
* A = Active
223225
* D = Dormant
224226
* U = Unpaid Leave

articles/active-directory/authentication/concept-authentication-authenticator-app.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,15 @@ Authenticator leverages the native Apple cryptography to achieve FIPS 140, Secur
7272

7373
FIPS 140 compliance for Microsoft Authenticator on Android is in progress and will follow soon.
7474

75+
## Determining Microsoft Authenticator registration type in My Security-Info
76+
Managining and adding additional Microsoft Authenticator registrations can be performed by users by accessing https://aka.ms/mysecurityinfo or by selecting Security info from from My Account. Specific icons are used to differentiate whether the Microsoft Authenticator registration is capable of passwordless phone sign-in or MFA.
77+
78+
Authenticator registration type | Icon
79+
------ | ------
80+
Microsoft Authenticator: Passwordless phone sign-in | <img width="43" alt="Microsoft Authenticator passwordless sign-in Capable" src="https://user-images.githubusercontent.com/50213291/211923744-d025cd70-4b88-4603-8baf-db0fc5d28486.png">
81+
Microsoft Authenticator: MFA capable | <img width="43" alt="Microsoft Authenticator MFA Capable" src="https://user-images.githubusercontent.com/50213291/211921054-d11983ad-4e0d-4612-9a14-0fef625a9a2a.png">
82+
83+
7584
## Next steps
7685

7786
- To get started with passwordless sign-in, see [Enable passwordless sign-in with the Microsoft Authenticator](howto-authentication-passwordless-phone.md).

articles/active-directory/authentication/concept-authentication-strengths.md

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -201,17 +201,9 @@ An authentication strength Conditional Access policy works together with [MFA tr
201201

202202
- **Users who signed in by using certificate-based authentication aren't prompted to reauthenticate** - If a user first authenticated by using certificate-based authentication and the authentication strength requires another method, such as a FIDO2 security key, the user isn't prompted to use a FIDO2 security key and authentication fails. The user must restart their session to sign-in with a FIDO2 security key.
203203

204-
- **Authentication methods that are currently not supported by authentication strength** - The Email one-time pass (Guest) authentication method is not included in the available combinations.
205-
206204
- **Using 'Require one of the selected controls' with 'require authentication strength' control** - After you select authentication strengths grant control and additional controls, all the selected controls must be satisfied in order to gain access to the resource. Using **Require one of the selected controls** isn't applicable, and will default to requiring all the controls in the policy.
207205

208-
- **Multiple Conditional Access policies may be created when using "Require authentication strength" grant control**. These are two different policies and you can safely delete one of them.
209-
210-
- **Windows Hello for Business** – If the user has used Windows Hello for Business as their primary authentication method it can be used to satisfy an authentication strength requirement that includes Windows Hello for Business. However, if the user has used another method as their primary authenticating method (for example, password) and the authentication strength requires them to use Windows Hello for Business they will not be prompted to use not register for Windows Hello for Business.
211-
212-
- **Authentication loop** can happen in one of the following scenarios:
213-
1. **Microsoft Authenticator (Phone Sign-in)** - When the user is required to use Microsoft Authenticator (Phone Sign-in) but the user is not registered for this method, they will be given instructions on how to set up the Microsoft Authenticator, that does not include how to enable Passwordless sign-in. As a result, the user can get into an authentication loop. To avoid this issue, make sure the user is registered for the method before the Conditional Access policy is enforced. Phone Sign-in can be registered using the steps outlined here: [Add your work or school account to the Microsoft Authenticator app ("Sign in with your credentials")](https://support.microsoft.com/en-us/account-billing/add-your-work-or-school-account-to-the-microsoft-authenticator-app-43a73ab5-b4e8-446d-9e54-2a4cb8e4e93c)
214-
2. **Conditional Access Policy is targeting all apps** - When the Conditional Access policy is targeting "All apps" but the user is not registered for any of the methods required by the authentication strength, the user will get into an authentication loop. To avoid this issue, target specific applications in the Conditional Access policy or make sure the user is registered for at least one of the authentication methods required by the authentication strength Conditional Access policy.
206+
- **Authentication loop** - When the user is required to use Microsoft Authenticator (Phone Sign-in) but the user is not registered for this method, they will be given instructions on how to set up the Microsoft Authenticator, that does not include how to enable Passwordless sign-in. As a result, the user can get into an authentication loop. To avoid this issue, make sure the user is registered for the method before the Conditional Access policy is enforced. Phone Sign-in can be registered using the steps outlined here: [Add your work or school account to the Microsoft Authenticator app ("Sign in with your credentials")](https://support.microsoft.com/en-us/account-billing/add-your-work-or-school-account-to-the-microsoft-authenticator-app-43a73ab5-b4e8-446d-9e54-2a4cb8e4e93c)
215207

216208

217209
## Limitations
@@ -220,8 +212,9 @@ An authentication strength Conditional Access policy works together with [MFA tr
220212

221213
- **Require multifactor authentication and Require authentication strength can't be used together in the same Conditional Access policy** - These two Conditional Access grant controls can't be used together because the built-in authentication strength **Multifactor authentication** is equivalent to the **Require multifactor authentication** grant control.
222214

215+
- **Authentication methods that are currently not supported by authentication strength** - The Email one-time pass (Guest) authentication method is not included in the available combinations.
223216

224-
<!---place holder: Auth Strength with CCS - will be documented in resilience-defaults doc-->
217+
- **Windows Hello for Business** – If the user has used Windows Hello for Business as their primary authentication method it can be used to satisfy an authentication strength requirement that includes Windows Hello for Business. However, if the user has used another method as their primary authenticating method (for example, password) and the authentication strength requires them to use Windows Hello for Business they will not be prompted to use not register for Windows Hello for Business.
225218

226219
## FAQ
227220

articles/active-directory/authentication/howto-authentication-methods-activity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/13/2021
9+
ms.date: 01/12/2023
1010

1111
ms.author: justinha
1212
author: sopand
@@ -112,7 +112,7 @@ The registration details report shows the following information for each user:
112112
- SSPR Registered (Registered, Not Registered)
113113
- SSPR Enabled (Enabled, Not Enabled)
114114
- SSPR Capable (Capable, Not Capable)
115-
- Methods registered (Email, Mobile Phone, Alternative Mobile Phone, Office Phone, Microsoft Authenticator Push, Software One Time Passcode, FIDO2, Security Key, Security questions)
115+
- Methods registered (Email, Mobile Phone, Alternative Mobile Phone, Office Phone, Microsoft Authenticator Push, Software One Time Passcode, FIDO2, Security Key, Security questions, Hardware OATH token)
116116

117117
![Screenshot of user registration details](media/how-to-authentication-methods-usage-insights/registration-details.png)
118118

@@ -133,7 +133,7 @@ The registration details report shows the following information for each user:
133133
## Limitations
134134

135135
- The data in the report is not updated in real-time and may reflect a latency of up to a few hours.
136-
- The **PhoneAppNotification** or **PhoneAppOTP** methods that a user might have configured are not displayed in the dashboard.
136+
- The **PhoneAppNotification** or **PhoneAppOTP** methods that a user might have configured are not displayed in the dashboard on **Azure AD Authentication methods - Policies**.
137137

138138
## Next steps
139139

38.9 KB
Loading
-61 KB
Loading

articles/active-directory/authentication/troubleshoot-authentication-strengths.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/26/2022
9+
ms.date: 01/11/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -35,6 +35,8 @@ To verify if a method can be used:
3535

3636
If the user is registered for an enabled method that meets the authentication strength, they might need to use another method that isn't available after primary authentication, such as Windows Hello for Business or certificate-based authentication. For more information, see [How each authentication method works](concept-authentication-methods.md#how-each-authentication-method-works). The user will need to restart the session and choose **Sign-in options** and select a method required by the authentication strength.
3737

38+
:::image type="content" border="true" source="./media/troubleshoot-authentication-strengths/choose-another-method.png" alt-text="Screenshot of how to choose another sign-in method.":::
39+
3840
## A user can't access a resource
3941

4042
If an authentication strength requires a method that a user can’t use, the user is blocked from sign-in. To check which method is required by an authentication strength, and which method the user is registered and enabled to use, follow the steps in the [previous section](#a-user-is-asked-to-sign-in-with-another-method-but-they-dont-see-a-method-they-expect).

articles/active-directory/cloud-sync/how-to-install-pshell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 01/31/2021
10+
ms.date: 01/11/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management

0 commit comments

Comments
 (0)