Skip to content

Commit 23d39e0

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into billing-ea-portal-articles-edit
2 parents 9f17d15 + 4ab0fb3 commit 23d39e0

File tree

422 files changed

+4929
-3463
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

422 files changed

+4929
-3463
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11686,6 +11686,11 @@
1168611686
"redirect_url": "/azure/lab-services/devtest-lab-attach-detach-data-disk",
1168711687
"redirect_document_id": false
1168811688
},
11689+
{
11690+
"source_path": "articles/lab-services/devtest-lab-auto-shutdown-vm.md",
11691+
"redirect_url": "/azure/lab-services/devtest-lab-auto-shutdown",
11692+
"redirect_document_id": false
11693+
},
1168911694
{
1169011695
"source_path": "articles/devtest-lab/devtest-lab-comparing-vm-base-image-types.md",
1169111696
"redirect_url": "/azure/lab-services/devtest-lab-comparing-vm-base-image-types",
@@ -27976,6 +27981,11 @@
2797627981
"redirect_url": "/azure/security-center/security-center-partner-integration",
2797727982
"redirect_document_id": false
2797827983
},
27984+
{
27985+
"source_path": "articles/security-center/security-center-playbooks.md",
27986+
"redirect_url": "/azure/security-center/workflow-automation",
27987+
"redirect_document_id": false
27988+
},
2797927989
{
2798027990
"source_path": "articles/security-center/security-center-compliance-rest-api.md",
2798127991
"redirect_url": "https://docs.microsoft.com/rest/api/securitycenter/compliances",
@@ -46580,6 +46590,11 @@
4658046590
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/overview",
4658146591
"redirect_document_id": false
4658246592
},
46593+
{
46594+
"source_path": "articles/load-balancer/load-balancer-standard-overview.md",
46595+
"redirect_url": "/azure/load-balancer/load-balancer-overview",
46596+
"redirect_document_id": false
46597+
},
4658346598
{
4658446599
"source_path": "articles/load-balancer/load-balancer-arm.md",
4658546600
"redirect_url": "/azure/load-balancer/load-balancer-overview",

articles/active-directory-b2c/active-directory-b2c-faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ There are two common reasons for why the Azure AD extension is not working for y
2323

2424
### Can I use Azure AD B2C features in my existing, employee-based Azure AD tenant?
2525

26-
Azure AD and Azure AD B2C are separate product offerings and cannot coexist in the same tenant. An Azure AD tenant represents an organization. An Azure AD B2C tenant represents a collection of identities to be used with relying party applications. With custom policies, Azure AD B2C can federate to Azure AD allowing authentication of employees in an organization.
26+
Azure AD and Azure AD B2C are separate product offerings and cannot coexist in the same tenant. An Azure AD tenant represents an organization. An Azure AD B2C tenant represents a collection of identities to be used with relying party applications. By adding **New OpenID Connect provider** under **Azure AD B2C > Identity providers** or with custom policies, Azure AD B2C can federate to Azure AD allowing authentication of employees in an organization.
2727

2828
### Can I use Azure AD B2C to provide social login (Facebook and Google+) into Office 365?
2929

articles/active-directory-b2c/active-directory-b2c-setup-goog-app.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,14 @@ ms.subservice: B2C
1818

1919
## Create a Google application
2020

21-
To use a Google account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your tenant that represents it. If you don't already have a Google account you can sign up at [https://accounts.google.com/SignUp](https://accounts.google.com/SignUp).
21+
To use a Google account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your Google Developers Console. If you don't already have a Google account you can sign up at [https://accounts.google.com/SignUp](https://accounts.google.com/SignUp).
2222

2323
1. Sign in to the [Google Developers Console](https://console.developers.google.com/) with your Google account credentials.
2424
1. In the upper-left corner of the page, select the project list, and then select **New Project**.
25-
1. Enter a **Project Name**, click **Create**, and then make sure you are using the new project.
25+
1. Enter a **Project Name**, select **Create**.
26+
1. Make sure you are using the new project by selecting the project drop-down in the top-left of the screen, select your project by name, then select **Open**.
27+
1. Select **OAuth consent screen** in the left menu, select **External**, and then select **Create**.
28+
Enter a **Name** for your application. Enter *b2clogin.com* in the **Authorized domains** section and select **Save**.
2629
1. Select **Credentials** in the left menu, and then select **Create credentials** > **Oauth client ID**.
2730
1. Under **Application type**, select **Web application**.
2831
1. Enter a **Name** for your application, enter `https://your-tenant-name.b2clogin.com` in **Authorized JavaScript origins**, and `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Authorized redirect URIs**. Replace `your-tenant-name` with the name of your tenant. You need to use all lowercase letters when entering your tenant name even if the tenant is defined with uppercase letters in Azure AD B2C.
Lines changed: 62 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,64 +1,98 @@
11
---
2-
title: Authenticating and securing users - Azure Active Directory
3-
description: As an Azure AD Administrator how do I protect user authentication while reducing end-user impact?
2+
title: Azure Active Directory authentication overview
3+
description: Learn about the different authentication methods and security features for user sign-ins with Azure Active Directory.
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: overview
9-
ms.date: 11/21/2019
9+
ms.date: 01/17/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
1313
manager: daveba
1414
ms.reviewer: sahenry, michmcla
1515

16-
# Customer intent: As an Azure AD administrator, I want to understand which Azure AD features I can use to secure sign-in and make the user authentication process safe and easy.
1716
ms.collection: M365-identity-device-management
17+
18+
# Customer intent: As an Azure AD administrator, I want to understand which Azure AD features I can use to secure sign-in and make the user authentication process safe and easy.
1819
---
19-
# What methods are available for authentication?
20+
# What is Azure Active Directory authentication?
21+
22+
One of the main features of an identity platform is to verify, or *authenticate*, credentials when a user signs in to a device, application, or service. In Azure Active Directory (Azure AD), authentication involves more than just the verification of a username and password. To improve security and reduce the need for help desk assistance, Azure AD authentication includes the following components:
2023

21-
We hear reports in the news, passwords being stolen, and identities being compromised. Requiring a second factor in addition to a password immediately increases the security of your organization. Microsoft Azure Active Directory (Azure AD) includes features, like Azure Multi-Factor Authentication (Azure MFA) and Azure AD self-service password reset (SSPR), to help administrators protect their organizations and users with additional authentication methods.
24+
* Self-service password reset
25+
* Azure Multi-Factor Authentication
26+
* Hybrid integration to write password changes back to on-premises environment
27+
* Hybrid integration to enforce password protection policies for an on-premises environment
28+
* Passwordless authentication
2229

23-
There are many scenarios that include: signing in to an application, resetting their password, enabling Windows Hello, and others, your users may be asked to provide additional verification that they are who they say they are.
30+
## Improve the end-user experience
2431

25-
Additional verification may come in the form of authentication methods such as:
32+
Azure AD helps to protect a user's identity and simplify their sign-in experience. Features like self-service password reset let users update or change their passwords using a web browser from any device. This feature is especially useful when the user has forgotten their password or their account is locked. Without waiting for a helpdesk or administrator to provide support, a user can unblock themselves and continue to work.
2633

27-
* A code provided in an email or text message
28-
* A phone call
29-
* A notification or code on their phone
30-
* Answers to security questions
34+
Azure Multi-Factor Authentication lets users choose an additional form of authentication during sign-in, such as a phone call or mobile app notification. This ability reduces the requirement for a single, fixed form of secondary authentication like a hardware token. If the user doesn't currently have one form of additional authentication, they can choose a different method and continue to work.
3135

32-
![Example login.microsoftonline.com login page in Chrome](media/overview-authentication/overview-login.png)
36+
![Authentication methods in use at the sign-in screen](media/concept-authentication-methods/overview-login.png)
3337

34-
Azure MFA and Azure AD self-service password reset give administrators control over configuration, policy, monitoring, and reporting using Azure AD and the Azure portal to protect their organizations.
38+
Passwordless authentication removes the need for the user to create and remember a secure password at all. Capabilities like Windows Hello for Business or FIDO2 security keys let users sign in to a device or application without a password. This ability can reduce the complexity of managing passwords across different environments.
3539

3640
## Self-service password reset
3741

38-
Self-service password reset provides your users the ability to reset their password, with no administrator intervention, when and where they need to.
42+
Self-service password reset gives users the ability to change or reset their password, with no administrator or help desk involvement. If a user's account is locked or they forget their password, they can follow prompts to unblock themselves and get back to work. This ability reduces help desk calls and loss of productivity when a user can't sign in to their device or an application.
43+
44+
Self-service password reset works in the following scenarios:
45+
46+
* **Password change -** when a user knows their password but wants to change it to something new.
47+
* **Password reset -** when a user can't sign in, such as when they forgot password, and want to reset their password.
48+
* **Account unlock -** when a user can't sign in because their account is locked out and want to unlock their account.
49+
50+
When a user updates or resets their password using self-service password reset, that password can also be written back to an on-premises Active Directory environment. Password writeback makes sure that a user can immediately use their updated credentials with on-premises devices and applications.
51+
52+
## Azure Multi-Factor Authentication
53+
54+
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
55+
56+
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn't something that's easy for an attacker to obtain or duplicate.
57+
58+
![Conceptual image of the different forms of multi-factor authentication](./media/concept-mfa-howitworks/methods.png)
59+
60+
Azure Multi-Factor Authentication works by requiring two or more of the following authentication methods:
61+
62+
* Something you know, typically a password.
63+
* Something you have, such as a trusted device that is not easily duplicated, like a phone or hardware key.
64+
* Something you are - biometrics like a fingerprint or face scan.
65+
66+
Users can register themselves for both self-service password reset and Azure Multi-Factor Authentication in one step to simplify the on-boarding experience. Administrators can define what forms of secondary authentication can be used. Azure Multi-Factor Authentication can also be required when users perform a self-service password reset to further secure that process.
67+
68+
## Password protection
69+
70+
By default, Azure AD blocks weak passwords such as *Password1*. A global banned password list is automatically updated and enforced that includes known weak passwords. If an Azure AD user tries to set their password to one of these weak passwords, they receive a notification to choose a more secure password.
3971

40-
> [!VIDEO https://www.youtube.com/embed/hc97Yx5PJiM]
72+
To increase security, you can define custom password protection policies. These policies can use filters to block any variation of a password containing a name such as *Contoso* or a location like *London*, for example.
4173

42-
Self-service password reset includes:
74+
For hybrid security, you can integrate Azure AD password protection with an on-premises Active Directory environment. A component installed in the on-prem environment receives the global banned password list and custom password protection policies from Azure AD, and domain controllers use them to process password change events. This hybrid approach makes sure that no matter how or where a user changes their credentials, you enforce the use of strong passwords.
4375

44-
* **Password change:** I know my password but want to change it to something new.
45-
* **Password reset:** I can't sign in and want to reset my password using one or more approved authentication methods.
46-
* **Account unlock:** I can't sign in because my account is locked out and I want to unlock using one or more approved authentication methods.
76+
## Passwordless authentication
4777

48-
## Multi-Factor Authentication
78+
The end-goal for many environments is to remove the use of passwords as part of sign-in events. Features like Azure password protection or Azure Multi-Factor Authentication help improve security, but a username and password remains a weak form of authentication that can be exposed or brute-force attacked.
4979

50-
Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Using administrator approved authentication methods, Azure MFA helps safeguard your access to data and applications, while meeting the demand for a simple sign-in process.
80+
![Security versus convenience with the authentication process that leads to passwordless](./media/concept-authentication-passwordless/passwordless-convenience-security.png)
5181

52-
## License requirements
82+
When you sign in with a passwordless method, credentials are provided through the use of methods like biometrics with Windows Hello for Business, or a FIDO2 security key. These authentication methods can't be easily duplicated by an attacker.
5383

54-
[!INCLUDE [Active Directory P1 license](../../../includes/active-directory-p1-license.md)]
84+
Azure AD provides ways to natively authenticate using passwordless methods to simplify the sign-in experience for users and reduce the risk of attacks.
5585

5686
## Next steps
5787

58-
The next step is to dive in and configure self-service password reset and Azure Multi-Factor Authentication.
88+
To get started, see the [quickstart for self-service password reset][quickstart-sspr] and [Azure Multi-Factor Authentication tutorial][tutorial-mfa-applications].
5989

60-
To get started with self-service password reset, see the [enable SSPR quickstart article](quickstart-sspr.md).
90+
To learn more about self-service password reset concepts, see [How Azure AD self-service password reset works][concept-sspr].
6191

62-
Learn more about self-service password reset in the article, [How it works: Azure AD self-service password reset](concept-sspr-howitworks.md)
92+
To learn more about multi-factor authentication concepts, see [How Azure Multi-Factor Authentication works][concept-mfa].
6393

64-
Learn more about Azure Multi-Factor Authentication in the article, [How it works: Azure Multi-Factor Authentication](concept-mfa-howitworks.md)
94+
<!-- INTERNAL LINKS -->
95+
[quickstart-sspr]: quickstart-sspr.md
96+
[tutorial-mfa-applications]: tutorial-mfa-applications.md
97+
[concept-sspr]: concept-sspr-howitworks.md
98+
[concept-mfa]: concept-mfa-howitworks.md

articles/active-directory/cloud-provisioning/tutorial-single-forest.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ You can use the environment you create in this tutorial for testing or for getti
2929

3030
### In your on-premises environment
3131

32-
1. Identity a domain-joined host server running Windows Server 2012 R2 or greater with minimum of 4 GB RAM and .NET 4.7.1+ runtime
32+
1. Identify a domain-joined host server running Windows Server 2012 R2 or greater with minimum of 4 GB RAM and .NET 4.7.1+ runtime
3333

3434
2. If there is a firewall between your servers and Azure AD, configure the following items:
3535
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:

articles/active-directory/develop/id-tokens.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,12 @@ This list shows the claims that are in most id_tokens by default (except where n
8282
|`uti` | Opaque String | An internal claim used by Azure to revalidate tokens. Should be ignored. |
8383
|`ver` | String, either 1.0 or 2.0 | Indicates the version of the id_token. |
8484

85+
86+
> [!NOTE]
87+
> The v1 and v2 id_token have differences in the amount of information they will carry as seen from the examples above. The version essentially specifies the Azure AD platform endpoint from where it was issued. [Azure AD Oauth implementation](https://docs.microsoft.com/azure/active-directory/develop/about-microsoft-identity-platform) have evolved through the years. Currently we have two different oAuth endpoints for AzureAD applications. You can use any of the new endpoints which are categorized as v2 or the old one which is said to be v1. The Oauth endpoints for both of them are different. The V2 endpoint is the newer one where we are trying to migrate all the features of v1 endpoint and recommend new developers to use the v2 endpoint.
88+
> - V1: Azure Active Directory Endpoints: `https://login.microsoftonline.com/common/oauth2/authorize`
89+
> - V2: Microsoft Identity Platform Endpoints: `https://login.microsoftonline.com/common/oauth2/v2.0/authorize`
90+
8591
## Validating an id_token
8692

8793
Validating an `id_token` is similar to the first step of [validating an access token](access-tokens.md#validating-tokens) - your client should validate that the correct issuer has sent back the token and that it hasn't been tampered with. Because `id_tokens` are always a JWT, many libraries exist to validate these tokens - we recommend you use one of these rather than doing it yourself.

0 commit comments

Comments
 (0)