Skip to content

Commit 2a2af81

Browse files
authored
Merge pull request #101590 from MicrosoftDocs/master
1/17 PM Publish
2 parents 990db9d + a988f74 commit 2a2af81

File tree

99 files changed

+2617
-1567
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

99 files changed

+2617
-1567
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1756,6 +1756,11 @@
17561756
"redirect_url": "/azure/cosmos-db/conflict-resolution-policies",
17571757
"redirect_document_id": true
17581758
},
1759+
{
1760+
"source_path": "articles/cosmos-db/how-to-custom-synchronization.md",
1761+
"redirect_url": "/azure/cosmos-db/how-to-multi-master",
1762+
"redirect_document_id": true
1763+
},
17591764
{
17601765
"source_path": "articles/cosmos-db/create-sql-api-dotnet-preview.md",
17611766
"redirect_url": "/azure/cosmos-db/create-sql-api-dotnet",
@@ -46575,6 +46580,11 @@
4657546580
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/overview",
4657646581
"redirect_document_id": false
4657746582
},
46583+
{
46584+
"source_path": "articles/load-balancer/load-balancer-standard-overview.md",
46585+
"redirect_url": "/azure/load-balancer/load-balancer-overview",
46586+
"redirect_document_id": false
46587+
},
4657846588
{
4657946589
"source_path": "articles/load-balancer/load-balancer-arm.md",
4658046590
"redirect_url": "/azure/load-balancer/load-balancer-overview",

articles/active-directory-b2c/active-directory-b2c-setup-goog-app.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,14 @@ ms.subservice: B2C
1818

1919
## Create a Google application
2020

21-
To use a Google account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your tenant that represents it. If you don't already have a Google account you can sign up at [https://accounts.google.com/SignUp](https://accounts.google.com/SignUp).
21+
To use a Google account as an [identity provider](active-directory-b2c-reference-oauth-code.md) in Azure Active Directory B2C (Azure AD B2C), you need to create an application in your Google Developers Console. If you don't already have a Google account you can sign up at [https://accounts.google.com/SignUp](https://accounts.google.com/SignUp).
2222

2323
1. Sign in to the [Google Developers Console](https://console.developers.google.com/) with your Google account credentials.
2424
1. In the upper-left corner of the page, select the project list, and then select **New Project**.
25-
1. Enter a **Project Name**, click **Create**, and then make sure you are using the new project.
25+
1. Enter a **Project Name**, select **Create**.
26+
1. Make sure you are using the new project by selecting the project drop-down in the top-left of the screen, select your project by name, then select **Open**.
27+
1. Select **OAuth consent screen** in the left menu, select **External**, and then select **Create**.
28+
Enter a **Name** for your application. Enter *b2clogin.com* in the **Authorized domains** section and select **Save**.
2629
1. Select **Credentials** in the left menu, and then select **Create credentials** > **Oauth client ID**.
2730
1. Under **Application type**, select **Web application**.
2831
1. Enter a **Name** for your application, enter `https://your-tenant-name.b2clogin.com` in **Authorized JavaScript origins**, and `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/oauth2/authresp` in **Authorized redirect URIs**. Replace `your-tenant-name` with the name of your tenant. You need to use all lowercase letters when entering your tenant name even if the tenant is defined with uppercase letters in Azure AD B2C.

articles/active-directory-b2c/restful-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ The technical profile also returns claims, that aren't returned by the identity
125125
| SendClaimsIn | No | Specifies how the input claims are sent to the RESTful claims provider. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the input claim that is sent in the request body in JSON format. The `Form` value is the input claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the input claim that is sent in the request header. The `QueryString` value is the input claim that is sent in the request query string. The HTTP verbs invoked by each are as follows:<br /><ul><li>`Body`: POST</li><li>`Form`: POST</li><li>`Header`: GET</li><li>`QueryString`: GET</li></ul> |
126126
| ClaimsFormat | No | Specifies the format for the output claims. Possible values: `Body` (default), `Form`, `Header`, or `QueryString`. The `Body` value is the output claim that is sent in the request body in JSON format. The `Form` value is the output claim that is sent in the request body in an ampersand '&' separated key value format. The `Header` value is the output claim that is sent in the request header. The `QueryString` value is the output claim that is sent in the request query string. |
127127
| ClaimUsedForRequestPayload| No | Name of a string claim that contains the payload to be sent to the REST API. |
128-
| DebugMode | No | Runs the technical profile in debug mode. In debug mode, the REST API can return more information. See the returning error message section. |
128+
| DebugMode | No | Runs the technical profile in debug mode. Possible values: `true`, or `false` (default). In debug mode, the REST API can return more information. See the [Returning error message](#returning-error-message) section. |
129129

130130
## Cryptographic keys
131131

@@ -212,7 +212,7 @@ If the type of authentication is set to `Bearer`, the **CryptographicKeys** elem
212212

213213
## Returning error message
214214

215-
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. In an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
215+
Your REST API may need to return an error message, such as 'The user was not found in the CRM system'. If an error occurs, the REST API should return an HTTP 409 error message (Conflict response status code) with following attributes:
216216

217217
| Attribute | Required | Description |
218218
| --------- | -------- | ----------- |
Lines changed: 62 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -1,64 +1,98 @@
11
---
2-
title: Authenticating and securing users - Azure Active Directory
3-
description: As an Azure AD Administrator how do I protect user authentication while reducing end-user impact?
2+
title: Azure Active Directory authentication overview
3+
description: Learn about the different authentication methods and security features for user sign-ins with Azure Active Directory.
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: overview
9-
ms.date: 11/21/2019
9+
ms.date: 01/17/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
1313
manager: daveba
1414
ms.reviewer: sahenry, michmcla
1515

16-
# Customer intent: As an Azure AD administrator, I want to understand which Azure AD features I can use to secure sign-in and make the user authentication process safe and easy.
1716
ms.collection: M365-identity-device-management
17+
18+
# Customer intent: As an Azure AD administrator, I want to understand which Azure AD features I can use to secure sign-in and make the user authentication process safe and easy.
1819
---
19-
# What methods are available for authentication?
20+
# What is Azure Active Directory authentication?
21+
22+
One of the main features of an identity platform is to verify, or *authenticate*, credentials when a user signs in to a device, application, or service. In Azure Active Directory (Azure AD), authentication involves more than just the verification of a username and password. To improve security and reduce the need for help desk assistance, Azure AD authentication includes the following components:
2023

21-
We hear reports in the news, passwords being stolen, and identities being compromised. Requiring a second factor in addition to a password immediately increases the security of your organization. Microsoft Azure Active Directory (Azure AD) includes features, like Azure Multi-Factor Authentication (Azure MFA) and Azure AD self-service password reset (SSPR), to help administrators protect their organizations and users with additional authentication methods.
24+
* Self-service password reset
25+
* Azure Multi-Factor Authentication
26+
* Hybrid integration to write password changes back to on-premises environment
27+
* Hybrid integration to enforce password protection policies for an on-premises environment
28+
* Passwordless authentication
2229

23-
There are many scenarios that include: signing in to an application, resetting their password, enabling Windows Hello, and others, your users may be asked to provide additional verification that they are who they say they are.
30+
## Improve the end-user experience
2431

25-
Additional verification may come in the form of authentication methods such as:
32+
Azure AD helps to protect a user's identity and simplify their sign-in experience. Features like self-service password reset let users update or change their passwords using a web browser from any device. This feature is especially useful when the user has forgotten their password or their account is locked. Without waiting for a helpdesk or administrator to provide support, a user can unblock themselves and continue to work.
2633

27-
* A code provided in an email or text message
28-
* A phone call
29-
* A notification or code on their phone
30-
* Answers to security questions
34+
Azure Multi-Factor Authentication lets users choose an additional form of authentication during sign-in, such as a phone call or mobile app notification. This ability reduces the requirement for a single, fixed form of secondary authentication like a hardware token. If the user doesn't currently have one form of additional authentication, they can choose a different method and continue to work.
3135

32-
![Example login.microsoftonline.com login page in Chrome](media/overview-authentication/overview-login.png)
36+
![Authentication methods in use at the sign-in screen](media/concept-authentication-methods/overview-login.png)
3337

34-
Azure MFA and Azure AD self-service password reset give administrators control over configuration, policy, monitoring, and reporting using Azure AD and the Azure portal to protect their organizations.
38+
Passwordless authentication removes the need for the user to create and remember a secure password at all. Capabilities like Windows Hello for Business or FIDO2 security keys let users sign in to a device or application without a password. This ability can reduce the complexity of managing passwords across different environments.
3539

3640
## Self-service password reset
3741

38-
Self-service password reset provides your users the ability to reset their password, with no administrator intervention, when and where they need to.
42+
Self-service password reset gives users the ability to change or reset their password, with no administrator or help desk involvement. If a user's account is locked or they forget their password, they can follow prompts to unblock themselves and get back to work. This ability reduces help desk calls and loss of productivity when a user can't sign in to their device or an application.
43+
44+
Self-service password reset works in the following scenarios:
45+
46+
* **Password change -** when a user knows their password but wants to change it to something new.
47+
* **Password reset -** when a user can't sign in, such as when they forgot password, and want to reset their password.
48+
* **Account unlock -** when a user can't sign in because their account is locked out and want to unlock their account.
49+
50+
When a user updates or resets their password using self-service password reset, that password can also be written back to an on-premises Active Directory environment. Password writeback makes sure that a user can immediately use their updated credentials with on-premises devices and applications.
51+
52+
## Azure Multi-Factor Authentication
53+
54+
Multi-factor authentication is a process where a user is prompted during the sign-in process for an additional form of identification, such as to enter a code on their cellphone or to provide a fingerprint scan.
55+
56+
If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the password is weak or has been exposed elsewhere, is it really the user signing in with the username and password, or is it an attacker? When you require a second form of authentication, security is increased as this additional factor isn't something that's easy for an attacker to obtain or duplicate.
57+
58+
![Conceptual image of the different forms of multi-factor authentication](./media/concept-mfa-howitworks/methods.png)
59+
60+
Azure Multi-Factor Authentication works by requiring two or more of the following authentication methods:
61+
62+
* Something you know, typically a password.
63+
* Something you have, such as a trusted device that is not easily duplicated, like a phone or hardware key.
64+
* Something you are - biometrics like a fingerprint or face scan.
65+
66+
Users can register themselves for both self-service password reset and Azure Multi-Factor Authentication in one step to simplify the on-boarding experience. Administrators can define what forms of secondary authentication can be used. Azure Multi-Factor Authentication can also be required when users perform a self-service password reset to further secure that process.
67+
68+
## Password protection
69+
70+
By default, Azure AD blocks weak passwords such as *Password1*. A global banned password list is automatically updated and enforced that includes known weak passwords. If an Azure AD user tries to set their password to one of these weak passwords, they receive a notification to choose a more secure password.
3971

40-
> [!VIDEO https://www.youtube.com/embed/hc97Yx5PJiM]
72+
To increase security, you can define custom password protection policies. These policies can use filters to block any variation of a password containing a name such as *Contoso* or a location like *London*, for example.
4173

42-
Self-service password reset includes:
74+
For hybrid security, you can integrate Azure AD password protection with an on-premises Active Directory environment. A component installed in the on-prem environment receives the global banned password list and custom password protection policies from Azure AD, and domain controllers use them to process password change events. This hybrid approach makes sure that no matter how or where a user changes their credentials, you enforce the use of strong passwords.
4375

44-
* **Password change:** I know my password but want to change it to something new.
45-
* **Password reset:** I can't sign in and want to reset my password using one or more approved authentication methods.
46-
* **Account unlock:** I can't sign in because my account is locked out and I want to unlock using one or more approved authentication methods.
76+
## Passwordless authentication
4777

48-
## Multi-Factor Authentication
78+
The end-goal for many environments is to remove the use of passwords as part of sign-in events. Features like Azure password protection or Azure Multi-Factor Authentication help improve security, but a username and password remains a weak form of authentication that can be exposed or brute-force attacked.
4979

50-
Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Using administrator approved authentication methods, Azure MFA helps safeguard your access to data and applications, while meeting the demand for a simple sign-in process.
80+
![Security versus convenience with the authentication process that leads to passwordless](./media/concept-authentication-passwordless/passwordless-convenience-security.png)
5181

52-
## License requirements
82+
When you sign in with a passwordless method, credentials are provided through the use of methods like biometrics with Windows Hello for Business, or a FIDO2 security key. These authentication methods can't be easily duplicated by an attacker.
5383

54-
[!INCLUDE [Active Directory P1 license](../../../includes/active-directory-p1-license.md)]
84+
Azure AD provides ways to natively authenticate using passwordless methods to simplify the sign-in experience for users and reduce the risk of attacks.
5585

5686
## Next steps
5787

58-
The next step is to dive in and configure self-service password reset and Azure Multi-Factor Authentication.
88+
To get started, see the [quickstart for self-service password reset][quickstart-sspr] and [Azure Multi-Factor Authentication tutorial][tutorial-mfa-applications].
5989

60-
To get started with self-service password reset, see the [enable SSPR quickstart article](quickstart-sspr.md).
90+
To learn more about self-service password reset concepts, see [How Azure AD self-service password reset works][concept-sspr].
6191

62-
Learn more about self-service password reset in the article, [How it works: Azure AD self-service password reset](concept-sspr-howitworks.md)
92+
To learn more about multi-factor authentication concepts, see [How Azure Multi-Factor Authentication works][concept-mfa].
6393

64-
Learn more about Azure Multi-Factor Authentication in the article, [How it works: Azure Multi-Factor Authentication](concept-mfa-howitworks.md)
94+
<!-- INTERNAL LINKS -->
95+
[quickstart-sspr]: quickstart-sspr.md
96+
[tutorial-mfa-applications]: tutorial-mfa-applications.md
97+
[concept-sspr]: concept-sspr-howitworks.md
98+
[concept-mfa]: concept-mfa-howitworks.md

articles/active-directory/develop/msal-js-pass-custom-state-authentication-request.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: conceptual
1212
ms.workload: identity
13-
ms.date: 05/29/2019
13+
ms.date: 01/16/2020
1414
ms.author: twhitney
1515
ms.reviewer: saeeda
1616
ms.custom: aaddev
@@ -19,6 +19,7 @@ ms.collection: M365-identity-device-management
1919
---
2020

2121
# Pass custom state in authentication requests using MSAL.js
22+
2223
The *state* parameter, as defined by OAuth 2.0, is included in an authentication request and is also returned in the token response to prevent cross-site request forgery attacks. By default, Microsoft Authentication Library for JavaScript (MSAL.js) passes a randomly generated unique *state* parameter value in the authentication requests.
2324

2425
The state parameter can also be used to encode information of the app's state before redirect. You can pass the user's state in the app, such as the page or view they were on, as input to this parameter. The MSAL.js library allows you to pass your custom state as state parameter in the `Request` object:
@@ -37,9 +38,17 @@ export type AuthenticationParameters = {
3738
account?: Account;
3839
sid?: string;
3940
loginHint?: string;
41+
forceRefresh?: boolean;
4042
};
4143
```
4244

45+
> [!Note]
46+
> If you would like to skip a cached token and go to the server, please pass in the boolean `forceRefresh` into the AuthenticationParameters object used to make a login/token request.
47+
> `forceRefresh` should not be used by default, because of the performance impact on your application.
48+
> Relying on the cache will give your users a better experience.
49+
> Skipping the cache should only be used in scenarios where you know the currently cached data does not have up-to-date information.
50+
> Such as an Admin tool that adds roles to a user that needs to get a new token with updated roles.
51+
4352
For example:
4453

4554
```javascript

articles/active-directory/manage-apps/application-proxy-qlik.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Follow these steps to publish your app. For a more detailed walkthrough of steps
4747
### Application #2:
4848
Follow the same steps as for Application #1, with the following exceptions:
4949

50-
**Step #5**: The Internal URL should now be the QlikSense URL with the authentication port used by the application. The default is **4244** for HTTPS, and 4248 for HTTP. Ex: **https&#58;//demo.qlik.com:4244**</br></br>
50+
**Step #5**: The Internal URL should now be the QlikSense URL with the authentication port used by the application. The default is **4244** for HTTPS, and **4248** for HTTP for QlikSense releases prior to April 2018. The default for QlikSense releases after April 2018 is **443** for HTTPS and **80** for HTTP. Ex: **https&#58;//demo.qlik.com:4244**</br></br>
5151
**Step #10:** Don’t set up SSO, and leave the **Single sign-on disabled**
5252

5353

0 commit comments

Comments
 (0)