Skip to content

Commit 1770630

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into log-articles-batch-2
2 parents 3614d63 + 6f23f37 commit 1770630

File tree

244 files changed

+3326
-2015
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

244 files changed

+3326
-2015
lines changed

articles/active-directory/authentication/concept-authentication-strengths.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/04/2022
9+
ms.date: 10/13/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -188,6 +188,7 @@ In external user scenarios, the authentication methods that can satisfy authenti
188188
|FIDO2 security key | ✅ | |
189189
|Windows Hello for Business | ✅ | |
190190

191+
For more information about how to set authentication strengths for external users, see [Conditional Access: Require an authentication strength for external users](../conditional-access/howto-conditional-access-policy-authentication-strength-external.md).
191192

192193
### User experience for external users
193194

@@ -209,7 +210,8 @@ An authentication strength Conditional Access policy works together with [MFA tr
209210
- **Authentication strength is not enforced on Register security information user action** – If an Authentication strength Conditional Access policy targets **Register security information** user action, the policy would not apply.
210211

211212
- **Conditional Access audit log** – When a Conditional Access policy with the authentication strength grant control is created or updated in the Azure AD portal, the auditing log includes details about the policy that was updated, but doesn't include the details about which authentication strength is referenced by the Conditional Access policy. This issue doesn't exist when a policy is created or updated By using Microsoft Graph APIs.
212-
<!-- Namrata to update about B2B--->
213+
214+
- **Using 'Require one of the selected controls' with 'require authentication strength' control** - After you select authentication strengths grant control and additional controls, all the selected controls must be satisfied in order to gain access to the resource. Using **Require one of the selected controls** isn't applicable, and will default to requiring all the controls in the policy.
213215

214216
## Limitations
215217

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -134,8 +134,9 @@ To map the pattern supported by certificateUserIds, administrators must use expr
134134
You can use the following expression for mapping to SKI and SHA1-PUKEY:
135135

136136
```
137-
(Contains([alternativeSecurityId],"x509:\<SKI>")>0,[alternativeSecurityId],Error("No altSecurityIdentities SKI match found."))
138-
& IIF(Contains([alternativeSecurityId],"x509:\<SHA1-PUKEY>")>0,[alternativeSecurityId],Error("No altSecurityIdentities SHA1-PUKEY match found."))
137+
IF(IsPresent([alternativeSecurityId]),
138+
Where($item,[alternativeSecurityId],BitOr(InStr($item, "x509:<SKI>"),InStr($item, "x509:<SHA1-PUKEY>"))>0),[alternativeSecurityId]
139+
)
139140
```
140141

141142
## Look up certificateUserIds using Microsoft Graph queries

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Azure Multi-Factor Auth Providers - Azure Active Directory
2+
title: Azure AD Multi-Factor Auth Providers - Azure Active Directory
33
description: When should you use an Auth Provider with Azure MFA?
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 11/21/2019
9+
ms.date: 10/10/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -15,30 +15,30 @@ ms.reviewer: michmcla
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# When to use an Azure Multi-Factor Authentication Provider
18+
# When to use an Azure AD Multi-Factor Authentication provider
1919

2020
> [!IMPORTANT]
2121
> Effective September 1st, 2018 new auth providers may no longer be created. Existing auth providers may continue to be used and updated, but migration is no longer possible. Multi-factor authentication will continue to be available as a feature in Azure AD Premium licenses.
2222
23-
Two-step verification is available by default for global administrators who have Azure Active Directory, and Microsoft 365 users. However, if you wish to take advantage of [advanced features](howto-mfa-mfasettings.md) then you should purchase the full version of Azure Multi-Factor Authentication (MFA).
23+
Two-step verification is available by default for Global Administrators who have Azure Active Directory, and Microsoft 365 users. However, if you wish to take advantage of [advanced features](howto-mfa-mfasettings.md) then you should purchase the full version of Azure AD Multi-Factor Authentication (MFA).
2424

25-
An Azure Multi-Factor Auth Provider is used to take advantage of features provided by Azure Multi-Factor Authentication for users who **do not have licenses**.
25+
An Azure AD Multi-Factor Auth Provider is used to take advantage of features provided by Azure AD Multi-Factor Authentication for users who **do not have licenses**.
2626

2727
## Caveats related to the Azure MFA SDK
2828

2929
Note the SDK has been deprecated and will only continue to work until November 14, 2018. After that time, calls to the SDK will fail.
3030

31-
## What is an MFA Provider?
31+
## What is an MFA provider?
3232

33-
There are two types of Auth providers, and the distinction is around how your Azure subscription is charged. The per-authentication option calculates the number of authentications performed against your tenant in a month. This option is best if you have a number of users authenticating only occasionally. The per-user option calculates the number of individuals in your tenant who perform two-step verification in a month. This option is best if you have some users with licenses but need to extend MFA to more users beyond your licensing limits.
33+
There are two types of Auth providers, and the distinction is around how your Azure subscription is charged. The per-authentication option calculates the number of authentications performed against your tenant in a month. This option is best if some users authenticate only occasionally. The per-user option calculates the number of users who are eligible to perform MFA, which is all users in Azure AD, and all enabled users in MFA Server. This option is best if some users have licenses but you need to extend MFA to more users beyond your licensing limits.
3434

35-
## Manage your MFA Provider
35+
## Manage your MFA provider
3636

37-
You cannot change the usage model (per enabled user or per authentication) after an MFA provider is created.
37+
You can't change the usage model (per enabled user or per authentication) after an MFA provider is created.
3838

3939
If you purchased enough licenses to cover all users that are enabled for MFA, you can delete the MFA provider altogether.
4040

41-
If your MFA provider is not linked to an Azure AD tenant, or you link the new MFA provider to a different Azure AD tenant, user settings and configuration options are not transferred. Also, existing Azure MFA Servers need to be reactivated using activation credentials generated through the MFA Provider.
41+
If your MFA provider isn't linked to an Azure AD tenant, or you link the new MFA provider to a different Azure AD tenant, user settings and configuration options aren't transferred. Also, existing Azure MFA Servers need to be reactivated using activation credentials generated through the MFA Provider.
4242

4343
### Removing an authentication provider
4444

@@ -61,7 +61,7 @@ Azure MFA Servers linked to providers will need to be reactivated using credenti
6161

6262
![Delete an auth provider from the Azure portal](./media/concept-mfa-authprovider/authentication-provider-removal.png)
6363

64-
When you have confirmed that all settings have been migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
64+
After you confirm that all settings are migrated, you can browse to the **Azure portal** > **Azure Active Directory** > **Security** > **MFA** > **Providers** and select the ellipses **...** and select **Delete**.
6565

6666
> [!WARNING]
6767
> Deleting an authentication provider will delete any reporting information associated with that provider. You may want to save activity reports before deleting your provider.
Loading

0 commit comments

Comments
 (0)