Skip to content

Commit 0ce8cb6

Browse files
authored
Merge pull request #204118 from MicrosoftDocs/main
7/08 AM Publish
2 parents bb1186c + 2ce7bbe commit 0ce8cb6

25 files changed

+158
-76
lines changed

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/15/2022
12+
ms.date: 06/27/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -154,7 +154,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
154154

155155
| Feature | Custom policy | Notes |
156156
| ------- | :--: | ----- |
157-
| [MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods) | Preview | Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
157+
| [MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods) | GA | Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
158158
| [Phone factor authentication](phone-factor-technical-profile.md) | GA | |
159159
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | Preview | |
160160
| [One-time password](one-time-password-technical-profile.md) | GA | |

articles/active-directory-b2c/faq.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,6 @@ sections:
146146
answer: |
147147
Yes. End users need to download any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app) (recommended). For details see, [verification methods](multi-factor-authentication.md#verification-methods).
148148
149-
This feature is in public preview.
150149
- question: |
151150
Why are my TOTP authenticator app codes not working?
152151
answer: |

articles/active-directory-b2c/multi-factor-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 01/14/2022
11+
ms.date: 06/27/2022
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -38,7 +38,7 @@ With [Conditional Access](conditional-access-identity-protection-overview.md) us
3838
- **SMS or phone call** - During the first sign-up or sign-in, the user is asked to provide and verify a phone number. During subsequent sign-ins, the user is prompted to select either the **Send Code** or **Call Me** phone MFA option. Depending on the user's choice, a text message is sent or a phone call is made to the verified phone number to identify the user. The user either provides the OTP code sent via text message or approves the phone call.
3939
- **Phone call only** - Works in the same way as the SMS or phone call option, but only a phone call is made.
4040
- **SMS only** - Works in the same way as the SMS or phone call option, but only a text message is sent.
41-
- **Authenticator app - TOTP (preview)** - The user must install an authenticator app that supports time-based one-time password (TOTP) verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app), on a device that they own. During the first sign-up or sign-in, the user scans a QR code or enters a code manually using the authenticator app. During subsequent sign-ins, the user types the TOTP code that appears on the authenticator app. See [how to set up the Microsoft Authenticator app](#enroll-a-user-in-totp-with-an-authenticator-app-for-end-users).
41+
- **Authenticator app - TOTP** - The user must install an authenticator app that supports time-based one-time password (TOTP) verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app), on a device that they own. During the first sign-up or sign-in, the user scans a QR code or enters a code manually using the authenticator app. During subsequent sign-ins, the user types the TOTP code that appears on the authenticator app. See [how to set up the Microsoft Authenticator app](#enroll-a-user-in-totp-with-an-authenticator-app-for-end-users).
4242

4343
> [!IMPORTANT]
4444
> Authenticator app - TOTP provides stronger security than SMS/Phone and email is the least secure. [SMS/Phone-based multi-factor authentication incurs separate charges from the normal Azure AD B2C MAU's pricing model](https://azure.microsoft.com/pricing/details/active-directory/external-identities/).
@@ -122,7 +122,7 @@ In Azure AD B2C, you can delete a user's TOTP authenticator app enrollment. Then
122122
1. In the left menu, select **Users**.
123123
1. Search for and select the user for which you want to delete TOTP authenticator app enrollment.
124124
1. In the left menu, select **Authentication methods**.
125-
1. Under **Usable authentication methods**, find **Software OATH token (Preview)**, and then select the ellipsis menu next to it. If you don't see this interface, select the option to **"Switch to the new user authentication methods experience! Click here to use it now"** to switch to the new authentication methods experience.
125+
1. Under **Usable authentication methods**, find **Software OATH token**, and then select the ellipsis menu next to it. If you don't see this interface, select the option to **"Switch to the new user authentication methods experience! Click here to use it now"** to switch to the new authentication methods experience.
126126
1. Select **Delete**, and then select **Yes** to confirm.
127127

128128
:::image type="content" source="media/multi-factor-authentication/authentication-methods.png" alt-text="User authentication methods":::

articles/active-directory/fundamentals/active-directory-architecture.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: fundamentals
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 05/23/2019
12+
ms.date: 07/08/2022
1313
ms.author: ajburnle
1414
ms.reviewer: jeffsta
1515
ms.custom: "it-pro, seodec18"
@@ -88,7 +88,7 @@ Azure AD operates across datacenters with the following characteristics:
8888

8989
* Authentication, Graph, and other AD services reside behind the Gateway service. The Gateway manages load balancing of these services. It will fail over automatically if any unhealthy servers are detected using transactional health probes. Based on these health probes, the Gateway dynamically routes traffic to healthy datacenters.
9090
* For *reads*, the directory has secondary replicas and corresponding front-end services in an active-active configuration operating in multiple datacenters. In case of a failure of an entire datacenter, traffic will be automatically routed to a different datacenter.
91-
*For *writes*, the directory will fail over primary (master) replica across datacenters via planned (new primary is synchronized to old primary) or emergency failover procedures. Data durability is achieved by replicating any commit to at least two datacenters.
91+
* For *writes*, the directory will fail over primary (master) replica across datacenters via planned (new primary is synchronized to old primary) or emergency failover procedures. Data durability is achieved by replicating any commit to at least two datacenters.
9292

9393
#### Data consistency
9494

articles/active-directory/fundamentals/road-to-the-cloud-posture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Many companies migrating from Active Directory (AD) to Azure Active Directory (A
2626

2727
* **Users and Groups**: Represent the human and non-human identities and attributes that access resources from different devices as specified.
2828

29-
:::image type="content" source="media/road-to-cloud-posture/road-to-the-cloud-start.png" alt-text="Architectural diagram depicting applications, devices, and users and groups layers, each containing common technologies found within each layer." border="false":::
29+
[ ![Architectural diagram depicting applications, devices, and users and groups layers, each containing common technologies found within each layer.](media/road-to-cloud-posture/road-to-the-cloud-start.png) ](media/road-to-cloud-posture/road-to-the-cloud-start.png#lightbox)
3030

3131
Microsoft has modeled five states of transformation that commonly align with the business goals of our customers. As the goals of customers mature, it's typical for them to shift from one state to the next at a pace that suits their resourcing and culture. This approach closely follows [Active Directory in Transition: Gartner Survey| Results and Analysis](https://www.gartner.com/en/documents/4006741).
3232

0 commit comments

Comments
 (0)