Skip to content

Commit 1d47b2a

Browse files
authored
Merge pull request #206587 from MicrosoftDocs/main
8/01 PM Publish
2 parents c6eb7bf + a18e59d commit 1d47b2a

File tree

786 files changed

+5033
-3043
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

786 files changed

+5033
-3043
lines changed

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The following table outlines when an authentication method can be used during a
6262

6363
| Method | Primary authentication | Secondary authentication |
6464
|--------------------------------|:----------------------:|:-------------------------:|
65-
| Windows Hello for Business | Yes | MFA |
65+
| Windows Hello for Business | Yes | MFA\* |
6666
| Microsoft Authenticator app | Yes | MFA and SSPR |
6767
| FIDO2 security key | Yes | MFA |
6868
| OATH hardware tokens (preview) | No | MFA and SSPR |
@@ -71,6 +71,8 @@ The following table outlines when an authentication method can be used during a
7171
| Voice call | No | MFA and SSPR |
7272
| Password | Yes | |
7373

74+
> \* Windows Hello for Business, by itself, does not serve as a step-up MFA credential. For example, an MFA Challenge from Sign-in Frequency or SAML Request containing forceAuthn=true. Windows Hello for Business can serve as a step-up MFA credential by being used in FIDO2 authentication. This requires users to be enabled for FIDO2 authentication to work sucessfully.
75+
7476
All of these authentication methods can be configured in the Azure portal, and increasingly using the [Microsoft Graph REST API](/graph/api/resources/authenticationmethods-overview).
7577

7678
To learn more about how each authentication method works, see the following separate conceptual articles:
122 KB
Loading

articles/active-directory/cloud-infrastructure-entitlement-management/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Organizations have to consider permissions management as a central piece of thei
2626
- IT security teams are under increased pressure to ensure access to their expanding cloud estate is secure and compliant.
2727
- The inconsistency of cloud providers' native access management models makes it even more complex for Security and Identity to manage permissions and enforce least privilege access policies across their entire environment.
2828

29-
:::image type="content" source="media/cloudknox-overview/cloudknox-key-cases.png" alt-text="CloudKnox Permissions Management.":::
29+
:::image type="content" source="media/overview/key-use-cases.png" alt-text="Diagram of Microsoft Entra Permissions Management use cases." lightbox="media/overview/key-use-cases.png":::
3030

3131
## Key use cases
3232

articles/active-directory/develop/howto-configure-publisher-domain.md

Lines changed: 92 additions & 64 deletions
Large diffs are not rendered by default.
Loading
17.3 KB
Loading
49.9 KB
Loading

articles/active-directory/develop/publisher-verification-overview.md

Lines changed: 45 additions & 36 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)