You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/policy-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Built-in policy definitions for Azure Active Directory Domain Services
3
3
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md
+5-11Lines changed: 5 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,30 +74,24 @@ Now we'll walk through each step:
74
74
75
75
## Certificate-based authentication is MFA capable
76
76
77
-
Azure AD CBA is an MFA (Multi factor authentication) capable method, that is Azure AD CBA can be either Single (SF) or Multi-factor (MF) depending on the tenant configuration. Enabling CBA for a user indicates the user is potentially capable of MFA. This means a user may need additional configuration to proof up to register other authentication methods when the user is in scope for CBA.
77
+
Azure AD CBA is an MFA (Multi factor authentication) capable method, that is Azure AD CBA can be either Single (SF) or Multi-factor (MF) depending on the tenant configuration. Enabling CBA for a user indicates the user is potentially capable of MFA. This means a user may need additional configuration to get MFA and proof up to register other authentication methods when the user is in scope for CBA.
78
78
79
-
This can happen when:
80
-
81
-
If CBA enabled user only has a Single Factor (SF) certificate
82
-
To unblock user:
83
-
1. Use Password + SF certificate.
79
+
If CBA enabled user only has a Single Factor (SF) certificate and need MFA
80
+
1. Use Password + SF certificate.
84
81
1. Issue Temporary Access Pass (TAP)
85
82
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
86
83
87
-
If CBA enabled user but has not yet been issued a certificate
88
-
To unblock user:
84
+
If CBA enabled user has not yet been issued a certificate and need MFA
89
85
1. Issue Temporary Access Pass (TAP)
90
86
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
91
87
92
-
If CBA enabled user cannot use MF cert (such as on mobile device without smart card support)
93
-
To unblock user:
88
+
If CBA enabled user cannot use MF cert (such as on mobile device without smart card support) and need MFA
94
89
1. Issue Temporary Access Pass (TAP)
95
90
1. User Register another MFA method (when user can use MF cert)
96
91
1. Use Password + MF cert (when user can use MF cert)
97
92
1. Admin adds Phone Number to user account and allows Voice/SMS method for user
98
93
99
94
100
-
101
95
## MFA with Single-factor certificate-based authentication
102
96
103
97
Azure AD CBA can be used as a second factor to meet MFA requirements with single-factor certificates. The supported combintaions are
Before you learn about the current state of your external collaboration, determine a security posture. Consider centralized vs. delegated control, also governance, regulatory, and compliance targets.
21
21
22
-
Learn more: [Determine your security posture for external users](1-secure-access-posture.md)
22
+
Learn more: [Determine your security posture for external access with Azure Active Directory](1-secure-access-posture.md)
23
23
24
-
Users in your organization likely collaborate with users from other organizations. Collaboration can occur with productivity applications like Microsoft 365, by email, or sharing resources with external users. The foundation of your governance plan can include:
24
+
Users in your organization likely collaborate with users from other organizations. Collaboration occurs with productivity applications like Microsoft 365, by email, or sharing resources with external users. These scenarios include users:
25
25
26
-
*Users initiating external collaboration
27
-
*Collaboration with external users and organizations
28
-
*Access granted to external users
26
+
*Initiating external collaboration
27
+
*Collaborating with external users and organizations
28
+
*Granting access to external users
29
29
30
-
## Users initiating external collaboration
30
+
## Determine who initiates external collaboration
31
31
32
-
Users seeking external collaboration know the applications needed for their work, and when access ends. Therefore, determine users with delegated permission to invite external users, create access packages, and complete access reviews.
32
+
Generally, users seeking external collaboration know the applications to use, and when access ends. Therefore, determine users with delegated permissions to invite external users, create access packages, and complete access reviews.
*[Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md)
36
+
* Microsoft 365[Audit log activities](/microsoft-365/compliance/audit-log-activities?view=o365-worldwide&preserve-view=true) - search for events and discover activities audited in Microsoft 365
37
+
*[Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md) - verify guest user access, and see records of system and user activities
38
38
39
-
## Collaboration with external users and organizations
39
+
## Enumerate guest users and organizations
40
40
41
-
External users might be Azure AD B2B users with partner-managed credentials, or external users with locally provisioned credentials. Typically, these users are a UserType of Guest. See,[B2B collaboration overview](../external-identities/what-is-b2b.md).
41
+
External users might be Azure AD B2B users with partner-managed credentials, or external users with locally provisioned credentials. Typically, these users are the Guest UserType. To learn about inviting guests users and sharing resources, see[B2B collaboration overview](../external-identities/what-is-b2b.md).
### Discover email domains and companyName property
55
55
56
-
Determine external organizations with the domain names of external user email addresses. This discovery might not be possible with consumer identity providers such as Google. We recommend you write the companyName attribute to identify external organizations.
56
+
You can determine external organizations with the domain names of external user email addresses. This discovery might not be possible with consumer identity providers. We recommend you write the companyName attribute to identify external organizations.
57
57
58
-
### Allowlist, blocklist, and entitlement management
58
+
### Use allowlist, blocklist, and entitlement management
59
59
60
-
For your organization to collaborate with, or block, specific organizations, at the tenant level, there is allowlist or blocklist. Use this feature to control B2B invitations and redemptions regardless of source (such as Microsoft Teams, SharePoint, or the Azure portal). See, [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md).
60
+
Use the allowlist or blocklist to enable your organization to collaborate with, or block, organizations at the tenant level. Control B2B invitations and redemptions regardless of source (such as Microsoft Teams, SharePoint, or the Azure portal).
61
+
62
+
See, [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md)
61
63
62
64
If you use entitlement management, you can confine access packages to a subset of partners with the **Specific connected organizations** option, under New access packages, in Identity Governance.
63
65
64
-

66
+

65
67
66
-
## External user access
68
+
## Determine external user access
67
69
68
-
After you have an inventory of external users and organizations, determine the access to grant to these users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
70
+
With an inventory of external users and organizations, determine the access to grant to the users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
69
71
70
72
*[Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?context=graph%2Fcontext&view=graph-rest-1.0&preserve-view=true)
71
73
*[Applications API overview](/graph/applications-concept-overview?view=graph-rest-1.0&preserve-view=true)
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new-sovereign-clouds.md
+55-3Lines changed: 55 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,58 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
22
22
This page is updated monthly, so revisit it regularly.
23
23
24
24
25
+
## January 2023
26
+
27
+
### General Availability - Azure AD Domain Services: Deeper Insights
28
+
29
+
**Type:** New feature
30
+
**Service category:** Azure AD Domain Services
31
+
**Product capability:** Azure AD Domain Services
32
+
33
+
Now within the Azure portal you have access to view key data for your Azure AD-DS Domain Controllers such as: LDAP Searches/sec, Total Query Received/sec, DNS Total Response Sent/sec, LDAP Successful Binds/sec, memory usage, processor time, Kerberos Authentications, and NTLM Authentications. For more information, see: [Check fleet metrics of Azure Active Directory Domain Services](/azure/active-directory-domain-services/fleet-metrics).
34
+
35
+
---
36
+
37
+
### General Availability - Add multiple domains to the same SAML/Ws-Fed based identity provider configuration for your external users
38
+
39
+
**Type:** New feature
40
+
**Service category:** B2B
41
+
**Product capability:** B2B/B2C
42
+
43
+
An IT admin can now add multiple domains to a single SAML/WS-Fed identity provider configuration to invite users from multiple domains to authenticate from the same identity provider endpoint. For more information, see: [Federation with SAML/WS-Fed identity providers for guest users](../external-identities/direct-federation.md).
44
+
45
+
---
46
+
47
+
### General Availability - New risk in Identity Protection: Anomalous user activity
This risk detection baselines normal administrative user behavior in Azure AD, and spots anomalous patterns of behavior like suspicious changes to the directory. The detection is triggered against the administrator making the change or the object that was changed. For more information, see: [User-linked detections](../identity-protection/concept-identity-protection-risks.md#user-linked-detections).
54
+
55
+
---
56
+
57
+
### General Availability - Administrative unit support for devices
58
+
59
+
**Type:** New feature
60
+
**Service category:** Directory Management
61
+
**Product capability:** AuthZ/Access Delegation
62
+
63
+
You can now use administrative units to delegate management of specified devices in your tenant by adding devices to an administrative unit, and assigning built-in and custom device management roles scoped to that administrative unit. For more information, see: [Device management](../roles/administrative-units.md#device-management).
64
+
65
+
---
66
+
67
+
### General Availability - Azure AD Terms of Use (ToU) API
Represents a tenant's customizable terms of use agreement that is created, and managed, with Azure Active Directory (Azure AD). You can use the following methods to create and manage the [Azure Active Directory Terms of Use feature](/graph/api/resources/agreement?#json-representation) according to your scenario. For more information, see: [agreement resource type](/graph/api/resources/agreement).
74
+
75
+
---
76
+
25
77
## December 2022
26
78
27
79
### General Availability - Risk-based Conditional Access for workload identities
@@ -40,7 +92,7 @@ Customers can now bring one of the most powerful forms of access control in the
Restore a recently deleted application, group, servicePrincipal, administrative unit, or user object from deleted items. If an item was accidentally deleted, you can fully restore the item. This isn't applicable to security groups, which are deleted permanently. A recently deleted item will remain available for up to 30 days. After 30 days, the item is permanently deleted. For more information, see: [servicePrincipal resource type](/graph/api/resources/serviceprincipal).
95
+
Restore a recently deleted application, group, servicePrincipal, administrative unit, or user object from deleted items. If an item was accidentally deleted, you can fully restore the item. This isn't applicable to security groups, which are deleted permanently. A recently deleted item remains available for up to 30 days. After 30 days, the item is permanently deleted. For more information, see: [servicePrincipal resource type](/graph/api/resources/serviceprincipal).
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business much easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Migrate to cloud authentication using Staged Rollout](../hybrid/how-to-connect-staged-rollout.md).
105
+
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Migrate to cloud authentication using Staged Rollout](../hybrid/how-to-connect-staged-rollout.md).
54
106
55
107
---
56
108
@@ -64,7 +116,7 @@ We're excited to announce the general availability of hybrid cloud Kerberos trus
64
116
**Service category:** Authentications (Logins)
65
117
**Product capability:** User Authentication
66
118
67
-
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business much easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Hybrid Cloud Kerberos Trust Deployment](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust).
119
+
We're excited to announce the general availability of hybrid cloud Kerberos trust, a new Windows Hello for Business deployment model to enable a password-less sign-in experience. With this new model, we’ve made Windows Hello for Business easier to deploy than the existing key trust and certificate trust deployment models by removing the need for maintaining complicated public key infrastructure (PKI), and Azure Active Directory (AD) Connect synchronization wait times. For more information, see: [Hybrid Cloud Kerberos Trust Deployment](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust).
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/howto-configure-prerequisites-for-reporting-api.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -81,7 +81,7 @@ Once you have the app registration configured, you can run activity log queries
81
81
1. Use one of the following queries to start using Microsoft Graph for accessing activity logs:
82
82
- GET `https://graph.microsoft.com/v1.0/auditLogs/directoryAudits`
83
83
- GET `https://graph.microsoft.com/v1.0/auditLogs/signIns`
84
-
- For more information on Microsoft Graph queries for activity logs, see [Activity reports API overview](/graph/api/resources/azuread-auditlog-overview)
84
+
- For more information on Microsoft Graph queries for activity logs, see [Activity reports API overview](/graph/api/resources/azure-ad-auditlog-overview)
85
85
86
86

87
87
@@ -134,4 +134,4 @@ Programmatic access APIs:
134
134
135
135
*[Get started with Azure Active Directory Identity Protection and Microsoft Graph](../identity-protection/howto-identity-protection-graph-api.md)
136
136
*[Audit API reference](/graph/api/resources/directoryaudit)
137
-
*[Sign-in API reference](/graph/api/resources/signin)
137
+
*[Sign-in API reference](/graph/api/resources/signin)
Copy file name to clipboardExpand all lines: articles/aks/policy-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Built-in policy definitions for Azure Kubernetes Service
3
3
description: Lists Azure Policy built-in policy definitions for Azure Kubernetes Service. These built-in policy definitions provide common approaches to managing your Azure resources.
Copy file name to clipboardExpand all lines: articles/api-management/policy-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Built-in policy definitions for Azure API Management
3
3
description: Lists Azure Policy built-in policy definitions for Azure API Management. These built-in policy definitions provide approaches to managing your Azure resources.
0 commit comments