Skip to content

Commit 26c0902

Browse files
committed
2 parents f89619b + 1c72f1a commit 26c0902

File tree

339 files changed

+1476
-1442
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

339 files changed

+1476
-1442
lines changed

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 01/29/2023
4+
ms.date: 02/21/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -74,30 +74,24 @@ Now we'll walk through each step:
7474

7575
## Certificate-based authentication is MFA capable
7676

77-
Azure AD CBA is an MFA (Multi factor authentication) capable method, that is Azure AD CBA can be either Single (SF) or Multi-factor (MF) depending on the tenant configuration. Enabling CBA for a user indicates the user is potentially capable of MFA. This means a user may need additional configuration to proof up to register other authentication methods when the user is in scope for CBA.
77+
Azure AD CBA is an MFA (Multi factor authentication) capable method, that is Azure AD CBA can be either Single (SF) or Multi-factor (MF) depending on the tenant configuration. Enabling CBA for a user indicates the user is potentially capable of MFA. This means a user may need additional configuration to get MFA and proof up to register other authentication methods when the user is in scope for CBA.
7878

79-
This can happen when:
80-
81-
If CBA enabled user only has a Single Factor (SF) certificate
82-
To unblock user:
83-
1. Use Password + SF certificate.
79+
If CBA enabled user only has a Single Factor (SF) certificate and need MFA
80+
1. Use Password + SF certificate.
8481
1. Issue Temporary Access Pass (TAP)
8582
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
8683

87-
If CBA enabled user but has not yet been issued a certificate
88-
To unblock user:
84+
If CBA enabled user has not yet been issued a certificate and need MFA
8985
1. Issue Temporary Access Pass (TAP)
9086
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
9187

92-
If CBA enabled user cannot use MF cert (such as on mobile device without smart card support)
93-
To unblock user:
88+
If CBA enabled user cannot use MF cert (such as on mobile device without smart card support) and need MFA
9489
1. Issue Temporary Access Pass (TAP)
9590
1. User Register another MFA method (when user can use MF cert)
9691
1. Use Password + MF cert (when user can use MF cert)
9792
1. Admin adds Phone Number to user account and allows Voice/SMS method for user
9893

9994

100-
10195
## MFA with Single-factor certificate-based authentication
10296

10397
Azure AD CBA can be used as a second factor to meet MFA requirements with single-factor certificates. The supported combintaions are

articles/active-directory/fundamentals/2-secure-access-current-state.md

Lines changed: 26 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: Discover the current state of external collaboration with Azure Active Directory
3-
description: Learn methods to discover the current state of your collaboration
2+
title: Discover the current state of external collaboration in your organization
3+
description: Discover the current state of an organization's collaboration with audit logs, reporting, allowlist, blocklist, and more.
44
services: active-directory
55
author: gargi-sinha
66
manager: martinco
77
ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 12/15/2022
11+
ms.date: 02/21/2023
1212
ms.author: gasinh
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
@@ -19,53 +19,55 @@ ms.collection: M365-identity-device-management
1919

2020
Before you learn about the current state of your external collaboration, determine a security posture. Consider centralized vs. delegated control, also governance, regulatory, and compliance targets.
2121

22-
Learn more: [Determine your security posture for external users](1-secure-access-posture.md)
22+
Learn more: [Determine your security posture for external access with Azure Active Directory](1-secure-access-posture.md)
2323

24-
Users in your organization likely collaborate with users from other organizations. Collaboration can occur with productivity applications like Microsoft 365, by email, or sharing resources with external users. The foundation of your governance plan can include:
24+
Users in your organization likely collaborate with users from other organizations. Collaboration occurs with productivity applications like Microsoft 365, by email, or sharing resources with external users. These scenarios include users:
2525

26-
* Users initiating external collaboration
27-
* Collaboration with external users and organizations
28-
* Access granted to external users
26+
* Initiating external collaboration
27+
* Collaborating with external users and organizations
28+
* Granting access to external users
2929

30-
## Users initiating external collaboration
30+
## Determine who initiates external collaboration
3131

32-
Users seeking external collaboration know the applications needed for their work, and when access ends. Therefore, determine users with delegated permission to invite external users, create access packages, and complete access reviews.
32+
Generally, users seeking external collaboration know the applications to use, and when access ends. Therefore, determine users with delegated permissions to invite external users, create access packages, and complete access reviews.
3333

3434
To find collaborating users:
3535

36-
* [Microsoft 365, audit log activities](/microsoft-365/compliance/audit-log-activities?view=o365-worldwide&preserve-view=true)
37-
* [Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md)
36+
* Microsoft 365 [Audit log activities](/microsoft-365/compliance/audit-log-activities?view=o365-worldwide&preserve-view=true) - search for events and discover activities audited in Microsoft 365
37+
* [Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md) - verify guest user access, and see records of system and user activities
3838

39-
## Collaboration with external users and organizations
39+
## Enumerate guest users and organizations
4040

41-
External users might be Azure AD B2B users with partner-managed credentials, or external users with locally provisioned credentials. Typically, these users are a UserType of Guest. See, [B2B collaboration overview](../external-identities/what-is-b2b.md).
41+
External users might be Azure AD B2B users with partner-managed credentials, or external users with locally provisioned credentials. Typically, these users are the Guest UserType. To learn about inviting guests users and sharing resources, see [B2B collaboration overview](../external-identities/what-is-b2b.md).
4242

4343
You can enumerate guest users with:
4444

4545
* [Microsoft Graph API](/graph/api/user-list?tabs=http)
4646
* [PowerShell](/graph/api/user-list?tabs=http)
4747
* [Azure portal](../enterprise-users/users-bulk-download.md)
4848

49-
There are tools to identify Azure AD B2B collaboration, external Azure AD tenants and users accessing applications:
49+
Use the following tools to identify Azure AD B2B collaboration, external Azure AD tenants, and users accessing applications:
5050

51-
* [PowerShell module](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MSIDCrossTenantAccessActivity)
52-
* [Azure Monitor workbook](../reports-monitoring/workbook-cross-tenant-access-activity.md)
51+
* PowerShell module, [Get MsIdCrossTenantAccessActivity](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MSIDCrossTenantAccessActivity)
52+
* [Cross-tenant access activity workbook](../reports-monitoring/workbook-cross-tenant-access-activity.md)
5353

54-
### Email domains and companyName property
54+
### Discover email domains and companyName property
5555

56-
Determine external organizations with the domain names of external user email addresses. This discovery might not be possible with consumer identity providers such as Google. We recommend you write the companyName attribute to identify external organizations.
56+
You can determine external organizations with the domain names of external user email addresses. This discovery might not be possible with consumer identity providers. We recommend you write the companyName attribute to identify external organizations.
5757

58-
### Allowlist, blocklist, and entitlement management
58+
### Use allowlist, blocklist, and entitlement management
5959

60-
For your organization to collaborate with, or block, specific organizations, at the tenant level, there is allowlist or blocklist. Use this feature to control B2B invitations and redemptions regardless of source (such as Microsoft Teams, SharePoint, or the Azure portal). See, [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md).
60+
Use the allowlist or blocklist to enable your organization to collaborate with, or block, organizations at the tenant level. Control B2B invitations and redemptions regardless of source (such as Microsoft Teams, SharePoint, or the Azure portal).
61+
62+
See, [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md)
6163

6264
If you use entitlement management, you can confine access packages to a subset of partners with the **Specific connected organizations** option, under New access packages, in Identity Governance.
6365

64-
![Screenshot of the Specific connected organizations option, under New access packages.](media/secure-external-access/2-new-access-package.png)
66+
![Screenshot of settings and options under Identity Governance, New access package.](media/secure-external-access/2-new-access-package.png)
6567

66-
## External user access
68+
## Determine external user access
6769

68-
After you have an inventory of external users and organizations, determine the access to grant to these users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
70+
With an inventory of external users and organizations, determine the access to grant to the users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
6971

7072
* [Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?context=graph%2Fcontext&view=graph-rest-1.0&preserve-view=true)
7173
* [Applications API overview](/graph/applications-concept-overview?view=graph-rest-1.0&preserve-view=true)

articles/active-directory/fundamentals/whats-new-sovereign-clouds.md

Lines changed: 55 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,58 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
2222
This page is updated monthly, so revisit it regularly.
2323

2424

25+
## January 2023
26+
27+
### General Availability - Azure AD Domain Services: Deeper Insights
28+
29+
**Type:** New feature
30+
**Service category:** Azure AD Domain Services
31+
**Product capability:** Azure AD Domain Services
32+
33+
Now within the Azure portal you have access to view key data for your Azure AD-DS Domain Controllers such as: LDAP Searches/sec, Total Query Received/sec, DNS Total Response Sent/sec, LDAP Successful Binds/sec, memory usage, processor time, Kerberos Authentications, and NTLM Authentications. For more information, see: [Check fleet metrics of Azure Active Directory Domain Services](/azure/active-directory-domain-services/fleet-metrics).
34+
35+
---
36+
37+
### General Availability - Add multiple domains to the same SAML/Ws-Fed based identity provider configuration for your external users
38+
39+
**Type:** New feature
40+
**Service category:** B2B
41+
**Product capability:** B2B/B2C
42+
43+
An IT admin can now add multiple domains to a single SAML/WS-Fed identity provider configuration to invite users from multiple domains to authenticate from the same identity provider endpoint. For more information, see: [Federation with SAML/WS-Fed identity providers for guest users](../external-identities/direct-federation.md).
44+
45+
---
46+
47+
### General Availability - New risk in Identity Protection: Anomalous user activity
48+
49+
**Type:** New feature
50+
**Service category:** Conditional Access
51+
**Product capability:** Identity Security & Protection
52+
53+
This risk detection baselines normal administrative user behavior in Azure AD, and spots anomalous patterns of behavior like suspicious changes to the directory. The detection is triggered against the administrator making the change or the object that was changed. For more information, see: [User-linked detections](../identity-protection/concept-identity-protection-risks.md#user-linked-detections).
54+
55+
---
56+
57+
### General Availability - Administrative unit support for devices
58+
59+
**Type:** New feature
60+
**Service category:** Directory Management
61+
**Product capability:** AuthZ/Access Delegation
62+
63+
You can now use administrative units to delegate management of specified devices in your tenant by adding devices to an administrative unit, and assigning built-in and custom device management roles scoped to that administrative unit. For more information, see: [Device management](../roles/administrative-units.md#device-management).
64+
65+
---
66+
67+
### General Availability - Azure AD Terms of Use (ToU) API
68+
69+
**Type:** New feature
70+
**Service category:** Conditional Access
71+
**Product capability:** Identity Security & Protection
72+
73+
Represents a tenant's customizable terms of use agreement that is created, and managed, with Azure Active Directory (Azure AD). You can use the following methods to create and manage the [Azure Active Directory Terms of Use feature](/graph/api/resources/agreement?#json-representation) according to your scenario. For more information, see: [agreement resource type](/graph/api/resources/agreement).
74+
75+
---
76+
2577
## December 2022
2678

2779
### General Availability - Risk-based Conditional Access for workload identities
@@ -40,7 +92,7 @@ Customers can now bring one of the most powerful forms of access control in the
4092
**Service category:** Enterprise Apps
4193
**Product capability:** Identity Lifecycle Management
4294

43-
Restore a recently deleted application, group, servicePrincipal, administrative unit, or user object from deleted items. If an item was accidentally deleted, you can fully restore the item. This isn't applicable to security groups, which are deleted permanently. A recently deleted item will remain available for up to 30 days. After 30 days, the item is permanently deleted. For more information, see: [servicePrincipal resource type](/graph/api/resources/serviceprincipal).
95+
Restore a recently deleted application, group, servicePrincipal, administrative unit, or user object from deleted items. If an item was accidentally deleted, you can fully restore the item. This isn't applicable to security groups, which are deleted permanently. A recently deleted item remains available for up to 30 days. After 30 days, the item is permanently deleted. For more information, see: [servicePrincipal resource type](/graph/api/resources/serviceprincipal).
4496

4597
---
4698

@@ -50,7 +102,7 @@ Restore a recently deleted application, group, servicePrincipal, administrative
50102
**Service category:** Authentications (Logins)
51103
**Product capability:** Identity Security & Protection
52104

53-
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business much easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Migrate to cloud authentication using Staged Rollout](../hybrid/how-to-connect-staged-rollout.md).
105+
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Migrate to cloud authentication using Staged Rollout](../hybrid/how-to-connect-staged-rollout.md).
54106

55107
---
56108

@@ -64,7 +116,7 @@ We're excited to announce the general availability of hybrid cloud Kerberos trus
64116
**Service category:** Authentications (Logins)
65117
**Product capability:** User Authentication
66118

67-
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business much easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Hybrid Cloud Kerberos Trust Deployment](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust).
119+
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Hybrid Cloud Kerberos Trust Deployment](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust).
68120

69121
---
70122

articles/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Once you have the app registration configured, you can run activity log queries
8181
1. Use one of the following queries to start using Microsoft Graph for accessing activity logs:
8282
- GET `https://graph.microsoft.com/v1.0/auditLogs/directoryAudits`
8383
- GET `https://graph.microsoft.com/v1.0/auditLogs/signIns`
84-
- For more information on Microsoft Graph queries for activity logs, see [Activity reports API overview](/graph/api/resources/azuread-auditlog-overview)
84+
- For more information on Microsoft Graph queries for activity logs, see [Activity reports API overview](/graph/api/resources/azure-ad-auditlog-overview)
8585

8686
![Screenshot of an activity log GET query in Microsoft Graph.](./media/howto-configure-prerequisites-for-reporting-api/graph-sample-get-query.png)
8787

@@ -134,4 +134,4 @@ Programmatic access APIs:
134134

135135
* [Get started with Azure Active Directory Identity Protection and Microsoft Graph](../identity-protection/howto-identity-protection-graph-api.md)
136136
* [Audit API reference](/graph/api/resources/directoryaudit)
137-
* [Sign-in API reference](/graph/api/resources/signin)
137+
* [Sign-in API reference](/graph/api/resources/signin)

articles/aks/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Kubernetes Service
33
description: Lists Azure Policy built-in policy definitions for Azure Kubernetes Service. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 01/05/2023
4+
ms.date: 02/21/2023
55
ms.topic: reference
66
ms.custom: subject-policy-reference
77
---

articles/api-management/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure API Management
33
description: Lists Azure Policy built-in policy definitions for Azure API Management. These built-in policy definitions provide approaches to managing your Azure resources.
4-
ms.date: 01/05/2023
4+
ms.date: 02/21/2023
55
author: dlepow
66
ms.author: danlep
77
ms.service: api-management

0 commit comments

Comments
 (0)