You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/custom-policy-developer-notes.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: reference
12
-
ms.date: 06/15/2022
12
+
ms.date: 06/27/2022
13
13
ms.custom: project-no-code
14
14
ms.author: kengaderdus
15
15
ms.subservice: B2C
@@ -154,7 +154,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
154
154
155
155
| Feature | Custom policy | Notes |
156
156
| ------- | :--: | ----- |
157
-
|[MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods)|Preview| Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
157
+
|[MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods)|GA| Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
158
158
|[Phone factor authentication](phone-factor-technical-profile.md)| GA ||
159
159
|[Azure AD MFA authentication](multi-factor-auth-technical-profile.md)| Preview ||
160
160
|[One-time password](one-time-password-technical-profile.md)| GA ||
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/faq.yml
-1Lines changed: 0 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -146,7 +146,6 @@ sections:
146
146
answer: |
147
147
Yes. End users need to download any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app) (recommended). For details see, [verification methods](multi-factor-authentication.md#verification-methods).
148
148
149
-
This feature is in public preview.
150
149
- question: |
151
150
Why are my TOTP authenticator app codes not working?
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/multi-factor-authentication.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: how-to
11
-
ms.date: 01/14/2022
11
+
ms.date: 06/27/2022
12
12
ms.custom: project-no-code
13
13
ms.author: kengaderdus
14
14
ms.subservice: B2C
@@ -38,7 +38,7 @@ With [Conditional Access](conditional-access-identity-protection-overview.md) us
38
38
-**SMS or phone call** - During the first sign-up or sign-in, the user is asked to provide and verify a phone number. During subsequent sign-ins, the user is prompted to select either the **Send Code** or **Call Me** phone MFA option. Depending on the user's choice, a text message is sent or a phone call is made to the verified phone number to identify the user. The user either provides the OTP code sent via text message or approves the phone call.
39
39
-**Phone call only** - Works in the same way as the SMS or phone call option, but only a phone call is made.
40
40
-**SMS only** - Works in the same way as the SMS or phone call option, but only a text message is sent.
41
-
-**Authenticator app - TOTP (preview)** - The user must install an authenticator app that supports time-based one-time password (TOTP) verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app), on a device that they own. During the first sign-up or sign-in, the user scans a QR code or enters a code manually using the authenticator app. During subsequent sign-ins, the user types the TOTP code that appears on the authenticator app. See [how to set up the Microsoft Authenticator app](#enroll-a-user-in-totp-with-an-authenticator-app-for-end-users).
41
+
-**Authenticator app - TOTP** - The user must install an authenticator app that supports time-based one-time password (TOTP) verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app), on a device that they own. During the first sign-up or sign-in, the user scans a QR code or enters a code manually using the authenticator app. During subsequent sign-ins, the user types the TOTP code that appears on the authenticator app. See [how to set up the Microsoft Authenticator app](#enroll-a-user-in-totp-with-an-authenticator-app-for-end-users).
42
42
43
43
> [!IMPORTANT]
44
44
> Authenticator app - TOTP provides stronger security than SMS/Phone and email is the least secure. [SMS/Phone-based multi-factor authentication incurs separate charges from the normal Azure AD B2C MAU's pricing model](https://azure.microsoft.com/pricing/details/active-directory/external-identities/).
@@ -122,7 +122,7 @@ In Azure AD B2C, you can delete a user's TOTP authenticator app enrollment. Then
122
122
1. In the left menu, select **Users**.
123
123
1. Search for and select the user for which you want to delete TOTP authenticator app enrollment.
124
124
1. In the left menu, select **Authentication methods**.
125
-
1. Under **Usable authentication methods**, find **Software OATH token (Preview)**, and then select the ellipsis menu next to it. If you don't see this interface, select the option to **"Switch to the new user authentication methods experience! Click here to use it now"** to switch to the new authentication methods experience.
125
+
1. Under **Usable authentication methods**, find **Software OATH token**, and then select the ellipsis menu next to it. If you don't see this interface, select the option to **"Switch to the new user authentication methods experience! Click here to use it now"** to switch to the new authentication methods experience.
126
126
1. Select **Delete**, and then select **Yes** to confirm.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/active-directory-architecture.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: fundamentals
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 05/23/2019
12
+
ms.date: 07/08/2022
13
13
ms.author: ajburnle
14
14
ms.reviewer: jeffsta
15
15
ms.custom: "it-pro, seodec18"
@@ -88,7 +88,7 @@ Azure AD operates across datacenters with the following characteristics:
88
88
89
89
* Authentication, Graph, and other AD services reside behind the Gateway service. The Gateway manages load balancing of these services. It will fail over automatically if any unhealthy servers are detected using transactional health probes. Based on these health probes, the Gateway dynamically routes traffic to healthy datacenters.
90
90
* For *reads*, the directory has secondary replicas and corresponding front-end services in an active-active configuration operating in multiple datacenters. In case of a failure of an entire datacenter, traffic will be automatically routed to a different datacenter.
91
-
*For *writes*, the directory will fail over primary (master) replica across datacenters via planned (new primary is synchronized to old primary) or emergency failover procedures. Data durability is achieved by replicating any commit to at least two datacenters.
91
+
*For *writes*, the directory will fail over primary (master) replica across datacenters via planned (new primary is synchronized to old primary) or emergency failover procedures. Data durability is achieved by replicating any commit to at least two datacenters.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/road-to-the-cloud-posture.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Many companies migrating from Active Directory (AD) to Azure Active Directory (A
26
26
27
27
***Users and Groups**: Represent the human and non-human identities and attributes that access resources from different devices as specified.
28
28
29
-
:::image type="content" source="media/road-to-cloud-posture/road-to-the-cloud-start.png" alt-text="Architectural diagram depicting applications, devices, and users and groups layers, each containing common technologies found within each layer." border="false":::
29
+
[](media/road-to-cloud-posture/road-to-the-cloud-start.png#lightbox)
30
30
31
31
Microsoft has modeled five states of transformation that commonly align with the business goals of our customers. As the goals of customers mature, it's typical for them to shift from one state to the next at a pace that suits their resourcing and culture. This approach closely follows [Active Directory in Transition: Gartner Survey| Results and Analysis](https://www.gartner.com/en/documents/4006741).
0 commit comments