Skip to content

Commit 1648c90

Browse files
authored
Merge pull request #201815 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents 42c4a77 + d5b0e3c commit 1648c90

File tree

167 files changed

+2591
-1220
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

167 files changed

+2591
-1220
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -355,6 +355,11 @@
355355
"redirect_url": "/azure/active-directory/saas-apps/mimecast-personal-portal-tutorial",
356356
"redirect_document_id": false
357357
},
358+
{
359+
"source_path_from_root": "/articles/active-directory/saas-apps/carlsonwagonlit-tutorial.md",
360+
"redirect_url": "/azure/active-directory/saas-apps/cwt-tutorial",
361+
"redirect_document_id": false
362+
},
358363
{
359364
"source_path_from_root": "/articles/active-directory/active-directory-saas-fax.plus-tutorial.md",
360365
"redirect_url": "/articles/active-directory/saas-apps/fax-plus-tutorial",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -754,6 +754,11 @@
754754
"redirect_url": "/azure/frontdoor/create-front-door-cli",
755755
"redirect_document_id": false
756756
},
757+
{
758+
"source_path_from_root": "/articles/cdn/index.yml",
759+
"redirect_url": "/azure/frontdoor",
760+
"redirect_document_id": false
761+
},
757762
{
758763
"source_path_from_root": "/articles/app-service-web/web-sites-dotnet-deploy-aspnet-mvc-app-membership-oauth-sql-database.md",
759764
"redirect_url": "/aspnet/core/security/authorization/secure-data",

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 104 additions & 4 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,10 @@
194194
href: concept-certificate-based-authentication-limitations.md
195195
- name: Configure Azure AD CBA
196196
href: how-to-certificate-based-authentication.md
197+
- name: Windows SmartCard logon
198+
href: concept-certificate-based-authentication-smartcard.md
199+
- name: Mobile devices
200+
href: concept-certificate-based-authentication-mobile.md
197201
- name: FAQ
198202
href: certificate-based-authentication-faq.yml
199203
- name: Troubleshoot

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -96,4 +96,6 @@ additionalContent: |
9696
* [Technical deep dive for Azure AD CBA](concept-certificate-based-authentication-technical-deep-dive.md)
9797
* [Limitations with Azure AD CBA](concept-certificate-based-authentication-limitations.md)
9898
* [How to configure Azure AD CBA](how-to-certificate-based-authentication.md)
99+
* [Windows SmartCard logon using Azure AD CBA](concept-certificate-based-authentication-smartcard.md)
100+
* [Azure AD CBA on mobile devices (Android and iOS)](concept-certificate-based-authentication-mobile.md)
99101
* [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)

articles/active-directory/authentication/concept-certificate-based-authentication-limitations.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/18/2022
9+
ms.date: 06/07/2022
1010

1111
ms.author: justinha
1212
author: vimrang
@@ -38,7 +38,6 @@ The following scenarios aren't supported:
3838

3939
- Public Key Infrastructure for creating client certificates. Customers need to configure their own Public Key Infrastructure (PKI) and provision certificates to their users and devices.
4040
- Certificate Authority hints aren't supported, so the list of certificates that appears for users in the UI isn't scoped.
41-
- Windows login using smart cards on Windows devices.
4241
- Only one CRL Distribution Point (CDP) for a trusted CA is supported.
4342
- The CDP can be only HTTP URLs. We don't support Online Certificate Status Protocol (OCSP), or Lightweight Directory Access Protocol (LDAP) URLs.
4443
- Configuring other certificate-to-user account bindings, such as using the **subject field**, or **keyid** and **issuer**, aren’t available in this release.
Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
---
2+
title: Azure Active Directory certificate-based authentication on mobile devices (Android and iOS) - Azure Active Directory
3+
description: Learn about Azure Active Directory certificate-based authentication on mobile devices (Android and iOS)
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: authentication
8+
ms.topic: how-to
9+
ms.date: 06/07/2022
10+
11+
ms.author: justinha
12+
author: vimrang
13+
manager: daveba
14+
ms.reviewer: vimrang
15+
16+
ms.collection: M365-identity-device-management
17+
ms.custom: has-adal-ref
18+
---
19+
# Azure Active Directory certificate-based authentication on mobile devices (Android and iOS) (Preview)
20+
21+
Android and iOS devices can use certificate-based authentication (CBA) to authenticate to Azure Active Directory using a client certificate on their device when connecting to:
22+
23+
- Office mobile applications such as Microsoft Outlook and Microsoft Word
24+
- Exchange ActiveSync (EAS) clients
25+
26+
Azure AD certificate-based authentication (CBA) is supported for certificates on-device on native browsers as well as on Microsoft first-party applications on both iOS and Android devices.
27+
28+
Azure AD CBA eliminates the need to enter a username and password combination into certain mail and Microsoft Office applications on your mobile device.
29+
30+
## Prerequisites
31+
32+
- For Android device, OS version must be Android 5.0 (Lollipop) and above.
33+
- For iOS device, OS version must be iOS 9 or above.
34+
- Microsoft Authenticator is required for Office applications on iOS.
35+
36+
## Microsoft mobile applications support
37+
38+
| Applications | Support |
39+
|:---------|:------------:|
40+
|Azure Information Protection app| ✅ |
41+
|Company Portal | ✅ |
42+
|Microsoft Teams | ✅ |
43+
|Office (mobile) | ✅ |
44+
|OneNote | ✅ |
45+
|OneDrive | ✅ |
46+
|Outlook | ✅ |
47+
|Power BI | ✅ |
48+
|Skype for Business | ✅ |
49+
|Word / Excel / PowerPoint | ✅ |
50+
|Yammer | ✅ |
51+
52+
## Support for Exchange ActiveSync clients
53+
54+
On iOS 9 or later, the native iOS mail client is supported.
55+
56+
Certain Exchange ActiveSync applications on Android 5.0 (Lollipop) or later are supported.
57+
58+
To determine if your email application supports this feature, contact your application developer.
59+
60+
## Known issue
61+
62+
On iOS, users will see a double prompt, where they must click the option to use certificate-based authentication twice. We are working on making the user experience better.
63+
64+
## Next steps
65+
66+
- [Overview of Azure AD CBA](concept-certificate-based-authentication.md)
67+
- [Technical deep dive for Azure AD CBA](concept-certificate-based-authentication-technical-deep-dive.md)
68+
- [Limitations with Azure AD CBA](concept-certificate-based-authentication-limitations.md)
69+
- [Windows SmartCard logon using Azure AD CBA](concept-certificate-based-authentication-smartcard.md)
70+
- [FAQ](certificate-based-authentication-faq.yml)
71+
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)
72+
73+
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
title: Windows SmartCard logon using Azure Active Directory certificate-based authentication - Azure Active Directory
3+
description: Learn how to enable Windows SmartCard logon using Azure Active Directory certificate-based authentication
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: authentication
8+
ms.topic: how-to
9+
ms.date: 06/15/2022
10+
11+
ms.author: justinha
12+
author: vimrang
13+
manager: daveba
14+
ms.reviewer: vimrang
15+
16+
ms.collection: M365-identity-device-management
17+
ms.custom: has-adal-ref
18+
---
19+
# Windows SmartCard logon using Azure Active Directory certificate-based authentication (Preview)
20+
21+
Azure AD users can authenticate using X.509 certificates on their SmartCards directly against Azure AD at Windows logon. There is no special configuration needed on the Windows client to accept the SmartCard authentication.
22+
23+
## User experience
24+
25+
Follow these steps to set up Windows SmartCard logon:
26+
27+
1. Join the machine to either Azure AD or a hybrid environment (hybrid join).
28+
1. Configure Azure AD CBA in your tenant as described in [Configure Azure AD CBA](how-to-certificate-based-authentication.md).
29+
1. Make sure the user is either on managed authentication or using staged rollout.
30+
1. Present the physical or virtual SmartCard to the test machine.
31+
1. Select SmartCard icon, enter the PIN and authenticate the user.
32+
33+
:::image type="content" border="false" source="./media/concept-certificate-based-authentication/smartcard.png" alt-text="Screenshot of SmartCard sign in.":::
34+
35+
Users will get a primary refresh token (PRT) from Azure Active Directory after the successful login and depending on the Certificate-based authentication configuration, the PRT will contain the multifactor claim.
36+
37+
## Restrictions and caveats
38+
39+
- The Windows login only works with the latest preview build of Windows 11. We are working to backport the functionality to Windows 10 and Windows Server.
40+
- Only Windows machines that are joined to either or a hybrid environment can test SmartCard logon.
41+
- Like in the other Azure AD CBA scenarios, the user must be on a managed domain or using staged rollout and cannot use a federated authentication model.
42+
43+
## Next steps
44+
45+
- [Overview of Azure AD CBA](concept-certificate-based-authentication.md)
46+
- [Technical deep dive for Azure AD CBA](concept-certificate-based-authentication-technical-deep-dive.md)
47+
- [Limitations with Azure AD CBA](concept-certificate-based-authentication-limitations.md)
48+
- [Azure AD CBA on mobile devices (Android and iOS)](concept-certificate-based-authentication-mobile.md)
49+
- [FAQ](certificate-based-authentication-faq.yml)
50+
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 03/11/2022
9+
ms.date: 06/15/2022
1010

1111
ms.author: justinha
1212
author: vimrang
@@ -34,7 +34,7 @@ Let's cover each step:
3434

3535
1. The user tries to access an application, such as [MyApps portal](https://myapps.microsoft.com/).
3636
1. If the user is not already signed in, the user is redirected to the Azure AD **User Sign-in** page at [https://login.microsoftonline.com/](https://login.microsoftonline.com/).
37-
1. The user enters their username into the Azure AD sign in page, and then clicks **Next**.
37+
1. The user enters their username into the Azure AD sign-in page, and then clicks **Next**.
3838

3939
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in.png" alt-text="Screenshot of the Sign-in for MyApps portal.":::
4040

@@ -82,7 +82,7 @@ Since multiple authentication binding policy rules can be created with different
8282

8383
1. Exact match is used for strong authentication via policy OID. If you have a certificate A with policy OID **1.2.3.4.5** and a derived credential B based on that certificate has a policy OID **1.2.3.4.5.6** and the custom rule is defined as **Policy OID** with value **1.2.3.4.5** with MFA, only certificate A will satisfy MFA and credential B will satisfy only single-factor authentication. If the user used derived credential during sign-in and was configured to have MFA, the user will be asked for a second factor for successful authentication.
8484
1. Policy OID rules will take precedence over certificate issuer rules. If a certificate has both policy OID and Issuer, the policy OID is always checked first and if no policy rule is found then the issuer subject bindings are checked. Policy OID has a higher strong authentication binding priority than the issuer.
85-
1. If one CA binds to MFA, all user certificates that this CA issues qualify as MFA. The same logic applies for single-factor authentication.
85+
1. If one CA binds to MFA, all user certificates that the CA issues qualify as MFA. The same logic applies for single-factor authentication.
8686
1. If one policy OID binds to MFA, all user certificates that include this policy OID as one of the OIDs (A user certificate could have multiple policy OIDs) qualify as MFA.
8787
1. If there is a conflict between multiple policy OIDs (such as when a certificate has two policy OIDs, where one binds to single-factor authentication and the other binds to MFA) then treat the certificate as a single-factor authentication.
8888
1. One certificate can only have one valid strong authentication binding (that is, a certificate cannot bind to both single-factor and MFA).
@@ -101,7 +101,7 @@ Use the highest priority (lowest number) binding.
101101
1. If a unique user is found, authenticate the user.
102102
1. If a unique user is not found, authentication fails.
103103
1. If the X.509 certificate field is not on the presented certificate, move to the next priority binding.
104-
1. If the specified X.509 certificate field is found on the certificate, but Azure AD does not find a user object in the directory matching that value, the authentication fails. Azure AD does not attempt to use the next binding in the list in this case. Only if the X.509 certificate field is not on the certificate does it tries the next binding, as mentioned in Step 2.
104+
1. If the specified X.509 certificate field is found on the certificate, but Azure AD does not find a user object in the directory matching that value, the authentication fails. Azure AD does not attempt to use the next binding in the list in this case. Only if the X.509 certificate field is not on the certificate does it try the next binding, as mentioned in Step 2.
105105

106106
## Understanding the certificate revocation process
107107

@@ -117,7 +117,7 @@ An admin can configure the CRL distribution point during the setup process of th
117117
>[!IMPORTANT]
118118
>If the admin skips the configuration of the CRL, Azure AD will not perform any CRL checks during the certificate-based authentication of the user. This can be helpful for initial troubleshooting but should not be considered for production use.
119119
120-
As of now, we don't support Online Certificate Status Protocol (OCSP) because of performance and reliability reasons. Instead of downloading the CRL at every connection by the client browser for OCSP, Azure AD downloads once at the first sign in and caches it, thereby improving the performance and reliability of CRL verification. We also index the cache so the search is must faster every time. Customers must publish CRLs for certificate revocation.
120+
As of now, we don't support Online Certificate Status Protocol (OCSP) because of performance and reliability reasons. Instead of downloading the CRL at every connection by the client browser for OCSP, Azure AD downloads once at the first sign-in and caches it, thereby improving the performance and reliability of CRL verification. We also index the cache so the search is much faster every time. Customers must publish CRLs for certificate revocation.
121121

122122
**Typical flow of the CRL check:**
123123

@@ -207,7 +207,7 @@ For the next test scenario, configure the authentication policy where the **poli
207207

208208
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/several-entries.png" alt-text="Screenshot of several entries in the sign-in logs." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/several-entries.png":::
209209

210-
The entry with **Interrupted** status provides has more diagnostic info in the **Additional Details** tab.
210+
The entry with **Interrupted** status has more diagnostic info on the **Additional Details** tab.
211211

212212
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/interrupted-user-details.png" alt-text="Screenshot of interrupted attempt details in the sign-in logs." :::
213213

@@ -240,5 +240,7 @@ For the next test scenario, configure the authentication policy where the **poli
240240
- [Overview of Azure AD CBA](concept-certificate-based-authentication.md)
241241
- [Limitations with Azure AD CBA](concept-certificate-based-authentication-limitations.md)
242242
- [How to configure Azure AD CBA](how-to-certificate-based-authentication.md)
243+
- [Windows SmartCard logon using Azure AD CBA](concept-certificate-based-authentication-smartcard.md)
244+
- [Azure AD CBA on mobile devices (Android and iOS)](concept-certificate-based-authentication-mobile.md)
243245
- [FAQ](certificate-based-authentication-faq.yml)
244246
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)

articles/active-directory/authentication/concept-certificate-based-authentication.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/09/2022
9+
ms.date: 06/07/2022
1010

1111
ms.author: justinha
1212
author: vimrang
@@ -62,6 +62,8 @@ The following images show how Azure AD CBA simplifies the customer environment b
6262
- [Technical deep dive for Azure AD CBA](concept-certificate-based-authentication-technical-deep-dive.md)
6363
- [Limitations with CBA](concept-certificate-based-authentication-limitations.md)
6464
- [How to configure CBA](how-to-certificate-based-authentication.md)
65+
- [Windows SmartCard logon using Azure AD CBA](concept-certificate-based-authentication-smartcard.md)
66+
- [Azure AD CBA on mobile devices (Android and iOS)](concept-certificate-based-authentication-mobile.md)
6567
- [FAQ](certificate-based-authentication-faq.yml)
6668
- [Troubleshoot CBA](troubleshoot-certificate-based-authentication.md)
6769

0 commit comments

Comments
 (0)