Skip to content

Commit 0bb9c87

Browse files
authored
Merge pull request #197190 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents d30ec60 + 2114609 commit 0bb9c87

File tree

171 files changed

+2307
-861
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

171 files changed

+2307
-861
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -671,7 +671,7 @@
671671
- name: Resources
672672
items:
673673
- name: Azure Roadmap
674-
href: https://azure.microsoft.com/roadmap/?category=security-identity
674+
href: https://azure.microsoft.com/updates/?status=nowavailable,inpreview,indevelopment&category=identity,security&query=b2c
675675
- name: Frequently asked questions
676676
href: ./faq.yml
677677
displayName: FAQ

articles/active-directory/authentication/active-directory-certificate-based-authentication-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/10/2022
9+
ms.date: 05/04/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -121,7 +121,7 @@ The EAS profile must contain the following information:
121121

122122
- The EAS endpoint (for example, outlook.office365.com)
123123

124-
An EAS profile can be configured and placed on the device through the utilization of Mobile device management (MDM) such as Intune or by manually placing the certificate in the EAS profile on the device.
124+
An EAS profile can be configured and placed on the device through the utilization of Mobile device management (MDM) such as Microsoft Endpoint Manager or by manually placing the certificate in the EAS profile on the device.
125125

126126
### Testing EAS client applications on Android
127127

articles/active-directory/authentication/active-directory-certificate-based-authentication-ios.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/16/2022
9+
ms.date: 05/04/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -29,7 +29,7 @@ Using certificates eliminates the need to enter a username and password combinat
2929
| Apps | Support |
3030
| --- | --- |
3131
| Azure Information Protection app |![Check mark signifying support for this application][1] |
32-
| Intune Company Portal |![Check mark signifying support for this application][1] |
32+
| Company Portal |![Check mark signifying support for this application][1] |
3333
| Microsoft Teams |![Check mark signifying support for this application][1] |
3434
| Office (mobile) |![Check mark signifying support for this application][1] |
3535
| OneNote |![Check mark signifying support for this application][1] |

articles/active-directory/authentication/concept-password-ban-bad-combined-policy.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Combined password policy and weak password check in Azure Active Directory
3-
description: Learn about the combined password policy and weak password check in Azure Active Directory
2+
title: Combined password policy and check for weak passwords in Azure Active Directory
3+
description: Learn about the combined password policy and check for weak passwords in Azure Active Directory
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/14/2021
9+
ms.date: 05/04/2022
1010

1111
ms.author: justinha
1212
author: sajiang
@@ -15,7 +15,7 @@ ms.reviewer: sajiang
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Combined password policy and weak password check in Azure Active Directory
18+
# Combined password policy and check for weak passwords in Azure Active Directory
1919

2020
Beginning in October 2021, Azure Active Directory (Azure AD) validation for compliance with password policies also includes a check for [known weak passwords](concept-password-ban-bad.md) and their variants.
2121
As the combined check for password policy and banned passwords gets rolled out to tenants, Azure AD and Office 365 admin center users may see differences when they create, change, or reset their passwords. This topic explains details about the password policy criteria checked by Azure AD.
@@ -24,29 +24,29 @@ As the combined check for password policy and banned passwords gets rolled out t
2424

2525
A password policy is applied to all user and admin accounts that are created and managed directly in Azure AD. You can [ban weak passwords](concept-password-ban-bad.md) and define parameters to [lock out an account](howto-password-smart-lockout.md) after repeated bad password attempts. Other password policy settings can't be modified.
2626

27-
The Azure AD password policy doesn't apply to user accounts synchronized from an on-premises AD DS environment using Azure AD Connect, unless you enable EnforceCloudPasswordPolicyForPasswordSyncedUsers.
27+
The Azure AD password policy doesn't apply to user accounts synchronized from an on-premises AD DS environment using Azure AD Connect unless you enable EnforceCloudPasswordPolicyForPasswordSyncedUsers.
2828

29-
The following Azure AD password policy requirements apply for all passwords that are created, changed, or reset in Azure AD. Requirements are applied during user provisioning, password change, and password reset flows. Unless noted, you can't change these settings.
29+
The following Azure AD password policy requirements apply for all passwords that are created, changed, or reset in Azure AD. Requirements are applied during user provisioning, password change, and password reset flows. You can't change these settings except as noted.
3030

3131
| Property | Requirements |
3232
| --- | --- |
3333
| Characters allowed |Uppercase characters (A - Z)<br>Lowercase characters (a - z)<br>Numbers (0 - 9)<br>Symbols:<br>- @ # $ % ^ & * - _ ! + = [ ] { } &#124; \ : ' , . ? / \` ~ " ( ) ; < ><br>- blank space |
3434
| Characters not allowed | Unicode characters |
35-
| Password length |Passwords require<br>- A minimum of 8 characters<br>- A maximum of 256 characters</li> |
36-
| Password complexity |Passwords require three out of four of the following:<br>- Uppercase characters<br>- Lowercase characters<br>- Numbers <br>- Symbols<br> Note: Password complexity check is not required for Education tenants. |
37-
| Password not recently used | When a user changes or resets their password, the new password cannot be the same as the current or recently used passwords. |
38-
| Password is not banned by [Azure AD Password Protection](concept-password-ban-bad.md) | The password can't be on the global list of banned passwords for Azure AD Password Protection, or on the customizable list of banned passwords specific to your organization. |
35+
| Password length |Passwords require<br>- A minimum of eight characters<br>- A maximum of 256 characters</li> |
36+
| Password complexity |Passwords require three out of four of the following categories:<br>- Uppercase characters<br>- Lowercase characters<br>- Numbers <br>- Symbols<br> Note: Password complexity check isn't required for Education tenants. |
37+
| Password not recently used | When a user changes or resets their password, the new password can't be the same as the current or recently used passwords. |
38+
| Password isn't banned by [Azure AD Password Protection](concept-password-ban-bad.md) | The password can't be on the global list of banned passwords for Azure AD Password Protection, or on the customizable list of banned passwords specific to your organization. |
3939

4040
## Password expiration policies
4141

42-
Password expiration policies are unchanged but they are included in this topic for completeness. A *global administrator* or *user administrator* can use the [Microsoft Azure AD Module for Windows PowerShell](/powershell/module/Azuread/) to set user passwords not to expire.
42+
Password expiration policies are unchanged but they're included in this topic for completeness. A *global administrator* or *user administrator* can use the [Microsoft Azure AD Module for Windows PowerShell](/powershell/module/Azuread/) to set user passwords not to expire.
4343

4444
> [!NOTE]
4545
> By default, only passwords for user accounts that aren't synchronized through Azure AD Connect can be configured to not expire. For more information about directory synchronization, see [Connect AD with Azure AD](../hybrid/how-to-connect-password-hash-synchronization.md#password-expiration-policy).
4646
4747
You can also use PowerShell to remove the never-expires configuration, or to see user passwords that are set to never expire.
4848

49-
The following expiration requirements apply to other providers that use Azure AD for identity and directory services, such as Intune and Microsoft 365.
49+
The following expiration requirements apply to other providers that use Azure AD for identity and directory services, such as Microsoft Endpoint Manager and Microsoft 365.
5050

5151
| Property | Requirements |
5252
| --- | --- |

articles/active-directory/authentication/concept-resilient-controls.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: authentication
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 07/13/2021
12+
ms.date: 05/04/2022
1313
ms.author: martinco
1414
ms.collection: M365-identity-device-management
1515
---
@@ -22,10 +22,10 @@ Organizations that rely on a single access control, such as multi-factor authent
2222

2323
This document provides guidance on strategies an organization should adopt to provide resilience to reduce the risk of lockout during unforeseen disruptions with the following scenarios:
2424

25-
1. Organizations can increase their resiliency to reduce the risk of lockout **before a disruption** by implementing mitigation strategies or contingency plans.
26-
2. Organizations can continue to access apps and resources they choose **during a disruption** by having mitigation strategies and contingency plans in place.
27-
3. Organizations should make sure they preserve information, such as logs, **after a disruption** and before they roll back any contingencies they implemented.
28-
4. Organizations that haven’t implemented prevention strategies or alternative plans may be able to implement **emergency options** to deal with the disruption.
25+
- Organizations can increase their resiliency to reduce the risk of lockout **before a disruption** by implementing mitigation strategies or contingency plans.
26+
- Organizations can continue to access apps and resources they choose **during a disruption** by having mitigation strategies and contingency plans in place.
27+
- Organizations should make sure they preserve information, such as logs, **after a disruption** and before they roll back any contingencies they implemented.
28+
- Organizations that haven’t implemented prevention strategies or alternative plans may be able to implement **emergency options** to deal with the disruption.
2929

3030
## Key guidance
3131

@@ -59,11 +59,11 @@ To unlock admin access to your tenant, you should create emergency access accoun
5959

6060
Incorporate the following access controls in your existing Conditional Access policies for organization:
6161

62-
1. Provision multiple authentication methods for each user that rely on different communication channels, for example the Microsoft Authenticator app (internet-based), OATH token (generated on-device), and SMS (telephonic). The following PowerShell script will help you identify in advance, which additional methods your users should register: [Script for Azure AD MFA authentication method analysis](/samples/azure-samples/azure-mfa-authentication-method-analysis/azure-mfa-authentication-method-analysis/).
63-
2. Deploy Windows Hello for Business on Windows 10 devices to satisfy MFA requirements directly from device sign-in.
64-
3. Use trusted devices via [Azure AD Hybrid Join](../devices/overview.md) or [Microsoft Intune Managed devices](/intune/planning-guide). Trusted devices will improve user experience because the trusted device itself can satisfy the strong authentication requirements of policy without an MFA challenge to the user. MFA will then be required when enrolling a new device and when accessing apps or resources from untrusted devices.
65-
4. Use Azure AD identity protection risk-based policies that prevent access when the user or sign-in is at risk in place of fixed MFA policies.
66-
5. If you are protecting VPN access using Azure AD MFA NPS extension, consider federating your VPN solution as a [SAML app](../manage-apps/view-applications-portal.md) and determine the app category as recommended below.
62+
- Provision multiple authentication methods for each user that rely on different communication channels, for example the Microsoft Authenticator app (internet-based), OATH token (generated on-device), and SMS (telephonic). The following PowerShell script will help you identify in advance, which additional methods your users should register: [Script for Azure AD MFA authentication method analysis](/samples/azure-samples/azure-mfa-authentication-method-analysis/azure-mfa-authentication-method-analysis/).
63+
- Deploy Windows Hello for Business on Windows 10 devices to satisfy MFA requirements directly from device sign-in.
64+
- Use trusted devices via [Azure AD Hybrid Join](../devices/overview.md) or [Microsoft Endpoint Manager](/intune/planning-guide). Trusted devices will improve user experience because the trusted device itself can satisfy the strong authentication requirements of policy without an MFA challenge to the user. MFA will then be required when enrolling a new device and when accessing apps or resources from untrusted devices.
65+
- Use Azure AD identity protection risk-based policies that prevent access when the user or sign-in is at risk in place of fixed MFA policies.
66+
- If you are protecting VPN access using Azure AD MFA NPS extension, consider federating your VPN solution as a [SAML app](../manage-apps/view-applications-portal.md) and determine the app category as recommended below.
6767

6868
>[!NOTE]
6969
> Risk-based policies require [Azure AD Premium P2](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing) licenses.

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/25/2021
9+
ms.date: 05/04/2022
1010

1111
ms.author: justinha
1212
author: justinha

articles/active-directory/authentication/how-to-authentication-sms-supported-apps.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
2424
| Office 365- Microsoft Online Services* || |
2525
| Microsoft One Note || |
2626
| Microsoft Teams |||
27-
| Microsoft Intune Company portal |||
27+
| Company portal |||
2828
| My Apps Portal ||Not available|
2929
| Microsoft Forms ||Not available|
3030
| Microsoft Edge || |
@@ -41,12 +41,12 @@ The above mentioned Microsoft apps support SMS sign-in is because they use the M
4141
## Unsupported Microsoft apps
4242

4343
Microsoft 365 desktop (Windows or Mac) apps and Microsoft 365 web apps (except MS One Note) that are accessed directly on the web don't support SMS sign-in. These apps use the Microsoft Office login (`https://office.live.com/start/*`) that requires a password to sign in.
44-
For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Intune Company Portal, and Microsoft Azure) don't support SMS sign-in.
44+
For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Company Portal, and Microsoft Azure) don't support SMS sign-in.
4545

4646
| Unsupported Microsoft apps| Examples |
4747
| --- | --- |
4848
| Native desktop Microsoft apps | Microsoft Teams, O365 apps, Word, Excel, etc.|
49-
| Native mobile Microsoft apps (except Microsoft Teams, Intune Company Portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
49+
| Native mobile Microsoft apps (except Microsoft Teams, Company Portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
5050
| Microsoft 365 web apps (accessed directly on web) | [Outlook](https://outlook.live.com/owa/), [Word](https://office.live.com/start/Word.aspx), [Excel](https://office.live.com/start/Excel.aspx), [PowerPoint](https://office.live.com/start/PowerPoint.aspx), [OneDrive](https://onedrive.live.com/about/signin)|
5151

5252
## Support for Non-Microsoft apps

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 05/28/2021
9+
ms.date: 05/04/2022
1010

1111
ms.author: baselden
1212
author: BarbaraSelden
@@ -216,13 +216,13 @@ There are three types of passwordless sign-in deployments available with securit
216216

217217
Enabling Windows 10 sign-in using FIDO2 security keys requires you to enable the credential provider functionality in Windows 10. Choose one of the following:
218218

219-
* [Enable credential provider with Intune](howto-authentication-passwordless-security-key-windows.md)
219+
* [Enable credential provider with Microsoft Endpoint Manager](howto-authentication-passwordless-security-key-windows.md)
220220

221-
* We recommend Intune deployment.
221+
* We recommend Microsoft Endpoint Manager deployment.
222222

223223
* [Enable credential provider with a provisioning package](howto-authentication-passwordless-security-key-windows.md)
224224

225-
* If Intune deployment isn't possible, administrators must deploy a package on each machine to enable the credential provider functionality. The package installation can be carried out by one of the following options:
225+
* If Microsoft Endpoint Manager deployment isn't possible, administrators must deploy a package on each machine to enable the credential provider functionality. The package installation can be carried out by one of the following options:
226226
* Group Policy or Configuration Manager
227227
* Local installation on a Windows 10 machine
228228

articles/active-directory/authentication/howto-authentication-passwordless-security-key-windows.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 04/20/2022
9+
ms.date: 05/04/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -99,7 +99,7 @@ To target specific device groups to enable the credential provider, use the foll
9999

100100
### Enable with a provisioning package
101101

102-
For devices not managed by Intune, a provisioning package can be installed to enable the functionality. The Windows Configuration Designer app can be installed from the [Microsoft Store](https://www.microsoft.com/p/windows-configuration-designer/9nblggh4tx22). Complete the following steps to create a provisioning package:
102+
For devices not managed by Microsoft Endpoint Manager, a provisioning package can be installed to enable the functionality. The Windows Configuration Designer app can be installed from the [Microsoft Store](https://www.microsoft.com/p/windows-configuration-designer/9nblggh4tx22). Complete the following steps to create a provisioning package:
103103

104104
1. Launch the Windows Configuration Designer.
105105
1. Select **File** > **New project**.

articles/active-directory/develop/authentication-flows-app-scenarios.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
1212
ms.workload: identity
13-
ms.date: 03/03/2020
13+
ms.date: 05/05/2022
1414
ms.author: jmprieur
1515
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started, has-adal-ref
1616
#Customer intent: As an app developer, I want to learn about authentication flows and application scenarios so I can create applications protected by the Microsoft identity platform.
@@ -106,7 +106,7 @@ To help protect a web app that signs in a user:
106106

107107
- If you develop in .NET, you use ASP.NET or ASP.NET Core with the ASP.NET OpenID Connect middleware. Protecting a resource involves validating the security token, which is done by the [IdentityModel extensions for .NET](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/wiki) and not MSAL libraries.
108108

109-
- If you develop in Node.js, you use [MSAL Node](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node) or [Passport.js](https://github.com/AzureAD/passport-azure-ad).
109+
- If you develop in Node.js, you use [MSAL Node](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node).
110110

111111
For more information, see [Web app that signs in users](scenario-web-app-sign-user-overview.md).
112112

@@ -291,9 +291,6 @@ Microsoft Authentication Libraries support multiple platforms:
291291

292292
You can also use various languages to build your applications.
293293

294-
> [!NOTE]
295-
> Some application types aren't available on every platform.
296-
297294
In the Windows column of the following table, each time .NET Core is mentioned, .NET Framework is also possible. The latter is omitted to avoid cluttering the table.
298295

299296
|Scenario | Windows | Linux | Mac | iOS | Android
@@ -311,5 +308,8 @@ For more information, see [Microsoft identity platform authentication libraries]
311308

312309
## Next steps
313310

314-
* Learn more about [authentication basics](./authentication-vs-authorization.md) and [access tokens in the Microsoft identity platform](access-tokens.md).
315-
* Learn more about [securing access to IoT apps](/azure/architecture/example-scenario/iot-aad/iot-aad).
311+
For more information about authentication, see:
312+
313+
- [Authentication vs. authorization.](./authentication-vs-authorization.md)
314+
- [Microsoft identity platform access tokens.](access-tokens.md)
315+
- [Securing access to IoT apps.](/azure/architecture/example-scenario/iot-aad/iot-aad#security)

0 commit comments

Comments
 (0)