Skip to content

Commit 2bf88ae

Browse files
committed
Merge branch 'main' into als-networking-scenarios-fix
2 parents 1c855e6 + b4cd4aa commit 2bf88ae

File tree

596 files changed

+6108
-3588
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

596 files changed

+6108
-3588
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22203,6 +22203,16 @@
2220322203
"redirect_url": "/azure/active-directory/develop/zero-trust-for-developers",
2220422204
"redirect_document_id": false
2220522205
},
22206+
{
22207+
"source_path_from_root": "/articles/active-directory/develop/active-directory-v2-protocols.md",
22208+
"redirect_url": "/azure/active-directory/develop/v2-protocols",
22209+
"redirect_document_id": false
22210+
},
22211+
{
22212+
"source_path_from_root": "/articles/active-directory/develop/msal-net-aad-b2c-considerations.md",
22213+
"redirect_url": "/azure/active-directory/develop/msal-net-b2c-considerations",
22214+
"redirect_document_id": false
22215+
},
2220622216
{
2220722217
"source_path_from_root": "/articles/active-directory/develop/active-directory-how-applications-are-added.md",
2220822218
"redirect_url": "/azure/active-directory/develop/how-applications-are-added",

articles/active-directory/authentication/howto-authentication-passwordless-faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ For a full list of endpoints needed to use Microsoft online products, see [Offic
106106
To check if the Windows 10 client device has the right domain join type, use the following command:
107107

108108
```console
109-
Dsregcmd/status
109+
Dsregcmd /status
110110
```
111111

112112
The following sample output shows that the device is Azure AD joined as *AzureADJoined* is set to *YES*:

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,14 +87,17 @@ Users can register for passwordless phone sign-in directly within the Microsoft
8787
6. Once signed-in, continue following the additional steps to set up phone sign-in.
8888

8989
### Guided registration with My Sign-ins
90+
> [!NOTE]
91+
> Users will only be able to register Microsoft Authenticator via combined registration if the Microsoft Authenticator authentication mode is to Any or Push.
92+
9093
To register the Microsoft Authenticator app, follow these steps:
9194

9295
1. Browse to [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo).
9396
1. Sign in, then select **Add method** > **Authenticator app** > **Add** to add Microsoft Authenticator.
9497
1. Follow the instructions to install and configure the Microsoft Authenticator app on your device.
9598
1. Select **Done** to complete Microsoft Authenticator configuration.
9699

97-
### Enable phone sign-in
100+
#### Enable phone sign-in
98101

99102
After users registered themselves for the Microsoft Authenticator app, they need to enable phone sign-in:
100103

5.28 KB
Loading

articles/active-directory/azuread-dev/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@
126126
- name: Add app roles in your application
127127
href: ../develop/howto-add-app-roles-in-azure-ad-apps.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
128128
- name: Branding guidelines
129-
href: ../develop/howto-add-branding-in-azure-ad-apps.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
129+
href: /azure/active-directory/develop/howto-add-branding-in-apps
130130
- name: Terms of Service and Privacy Statement
131131
href: ../develop/howto-add-terms-of-service-privacy-statement.md?toc=/azure/active-directory/azuread-dev/toc.json&bc=/azure/active-directory/azuread-dev/breadcrumb/toc.json
132132
- name: Bring an app to market

articles/active-directory/cloud-sync/bread/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,4 @@
88
items:
99
- name: Cloud sync
1010
tocHref: /azure/active-directory/hybrid/
11-
topicHref: /azure/active-directory/cloud-sync/index
11+
topicHref: /azure/active-directory/hybrid/cloud-sync/

articles/active-directory/conditional-access/concept-token-protection.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use token protection in Conditional Access policies.
44
ms.service: active-directory
55
ms.subservice: conditional-access
66
ms.topic: conceptual
7-
ms.date: 06/05/2023
7+
ms.date: 06/21/2023
88

99
ms.author: joflore
1010
author: MicrosoftGuyJFlo
@@ -24,6 +24,10 @@ Token protection creates a cryptographically secure tie between the token and th
2424
2525
With this preview, we're giving you the ability to create a Conditional Access policy to require token protection for sign-in tokens (refresh tokens) for specific services. We support token protection for sign-in tokens in Conditional Access for desktop applications accessing Exchange Online and SharePoint Online on Windows devices.
2626

27+
> [!IMPORTANT]
28+
> The following changes have been made to Token Protection since the initial public preview release:
29+
> * **Sign In logs output:** The value of the string used in "enforcedSessionControls" and "sessionControlsNotSatisfied" changed from "Binding" to "SignInTokenProtection" in late June 2023. Queries on Sign In Log data should be updated to reflect this change.
30+
2731
> [!NOTE]
2832
> We may interchange sign in tokens and refresh tokens in this content. This preview doesn't currently support access tokens or web cookies.
2933
@@ -47,6 +51,7 @@ This preview supports the following configurations:
4751
- PowerQuery extension for Excel
4852
- Extensions to Visual Studio Code which access Exchange or SharePoint
4953
- Visual Studio
54+
- The new Teams 2.1 preview client gets blocked after sign out due to a bug. This bug should be fixed in an August release.
5055
- The following Windows client devices aren't supported:
5156
- Windows Server
5257
- Surface Hub
@@ -129,6 +134,9 @@ You can also use [Log Analytics](../reports-monitoring/tutorial-log-analytics-wi
129134

130135
Here's a sample Log Analytics query searching the non-interactive sign-in logs for the last seven days, highlighting **Blocked** versus **Allowed** requests by **Application**. These queries are only samples and are subject to change.
131136

137+
> [!NOTE]
138+
> **Sign In logs output:** The value of the string used in "enforcedSessionControls" and "sessionControlsNotSatisfied" changed from "Binding" to "SignInTokenProtection" in late June 2023. Queries on Sign In Log data should be updated to reflect this change.
139+
132140
```kusto
133141
//Per Apps query
134142
// Select the log you want to query (SigninLogs or AADNonInteractiveUserSignInLogs )
@@ -142,10 +150,10 @@ AADNonInteractiveUserSignInLogs
142150
//Add userPrinicpalName if you want to filter
143151
// | where UserPrincipalName =="<user_principal_Name>"
144152
| mv-expand todynamic(ConditionalAccessPolicies)
145-
| where ConditionalAccessPolicies ["enforcedSessionControls"] contains '["Binding"]'
153+
| where ConditionalAccessPolicies ["enforcedSessionControls"] contains '["SignInTokenProtection"]'
146154
| where ConditionalAccessPolicies.result !="reportOnlyNotApplied" and ConditionalAccessPolicies.result !="notApplied"
147155
| extend SessionNotSatisfyResult = ConditionalAccessPolicies["sessionControlsNotSatisfied"]
148-
| extend Result = case (SessionNotSatisfyResult contains 'Binding', 'Block','Allow')
156+
| extend Result = case (SessionNotSatisfyResult contains 'SignInTokenProtection', 'Block','Allow')
149157
| summarize by Id,UserPrincipalName, AppDisplayName, Result
150158
| summarize Requests = count(), Users = dcount(UserPrincipalName), Block = countif(Result == "Block"), Allow = countif(Result == "Allow"), BlockedUsers = dcountif(UserPrincipalName, Result == "Block") by AppDisplayName
151159
| extend PctAllowed = round(100.0 * Allow/(Allow+Block), 2)
@@ -171,10 +179,10 @@ AADNonInteractiveUserSignInLogs
171179
//Add userPrincipalName if you want to filter
172180
// | where UserPrincipalName =="<user_principal_Name>"
173181
| mv-expand todynamic(ConditionalAccessPolicies)
174-
| where ConditionalAccessPolicies.enforcedSessionControls contains '["Binding"]'
182+
| where ConditionalAccessPolicies.enforcedSessionControls contains '["SignInTokenProtection"]'
175183
| where ConditionalAccessPolicies.result !="reportOnlyNotApplied" and ConditionalAccessPolicies.result !="notApplied"
176184
| extend SessionNotSatisfyResult = ConditionalAccessPolicies.sessionControlsNotSatisfied
177-
| extend Result = case (SessionNotSatisfyResult contains 'Binding', 'Block','Allow')
185+
| extend Result = case (SessionNotSatisfyResult contains 'SignInTokenProtection', 'Block','Allow')
178186
| summarize by Id, UserPrincipalName, AppDisplayName, ResourceDisplayName,Result
179187
| summarize Requests = count(),Block = countif(Result == "Block"), Allow = countif(Result == "Allow") by UserPrincipalName, AppDisplayName,ResourceDisplayName
180188
| extend PctAllowed = round(100.0 * Allow/(Allow+Block), 2)
Loading
338 KB
Loading

articles/active-directory/conditional-access/overview.md

Lines changed: 34 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -6,25 +6,27 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: overview
9-
ms.date: 02/13/2023
9+
ms.date: 06/20/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: amycolannino
14-
ms.reviewer: calebb
14+
ms.reviewer: kvenkit
1515

1616
ms.collection: M365-identity-device-management
1717
ms.custom: zt-include
1818
---
1919
# What is Conditional Access?
2020

21-
The modern security perimeter now extends beyond an organization's network to include user and device identity. Organizations can use identity-driven signals as part of their access control decisions.
21+
Microsoft is providing Conditional Access templates to organizations in report-only mode starting in January of 2023. We may add more policies as new threats emerge.
22+
23+
The modern security perimeter extends beyond an organization's network perimeter to include user and device identity. Organizations now use identity-driven signals as part of their access control decisions.
2224

2325
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4MwZs]
2426
25-
Conditional Access brings signals together, to make decisions, and enforce organizational policies. Azure AD Conditional Access is at the heart of the new identity-driven control plane.
27+
Azure AD Conditional Access brings signals together, to make decisions, and enforce organizational policies. Conditional Access is Microsoft's [Zero Trust policy engine](/security/zero-trust/deploy/identity) taking signals from various sources into account when enforcing policy decisions.
2628

27-
![Conceptual Conditional signal plus decision to get enforcement](./media/overview/conditional-access-signal-decision-enforcement.png)
29+
:::image type="content" source="media/overview/conditional-access-signal-decision-enforcement.png" alt-text="Diagram showing concept of Conditional Access signals plus decision to enforce organizational policy.":::
2830

2931
Conditional Access policies at their simplest are if-then statements, if a user wants to access a resource, then they must complete an action. Example: A payroll manager wants to access the payroll application and is required to do multifactor authentication to access it.
3032

@@ -35,14 +37,16 @@ Administrators are faced with two primary goals:
3537

3638
Use Conditional Access policies to apply the right access controls when needed to keep your organization secure.
3739

38-
![Conceptual Conditional Access process flow](./media/overview/conditional-access-overview-how-it-works.png)
39-
4040
> [!IMPORTANT]
4141
> Conditional Access policies are enforced after first-factor authentication is completed. Conditional Access isn't intended to be an organization's first line of defense for scenarios like denial-of-service (DoS) attacks, but it can use signals from these events to determine access.
4242
4343
## Common signals
4444

45-
Common signals that Conditional Access can take in to account when making a policy decision include the following signals:
45+
Conditional Access takes signals from various sources into account when making access decisions.
46+
47+
:::image type="content" source="media/overview/conditional-access-central-policy-engine-zero-trust.png" alt-text="Diagram showing Conditional Access as the Zero Trust policy engine aggregating signals from various sources.":::
48+
49+
These signals include:
4650

4751
- User or group membership
4852
- Policies can be targeted to specific users and groups giving administrators fine-grained control over access.
@@ -55,21 +59,24 @@ Common signals that Conditional Access can take in to account when making a poli
5559
- Application
5660
- Users attempting to access specific applications can trigger different Conditional Access policies.
5761
- Real-time and calculated risk detection
58-
- Signals integration with [Azure AD Identity Protection](../identity-protection/overview-identity-protection.md) allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to change their password, do multifactor authentication to reduce their risk level, or block access until an administrator takes manual action.
62+
- Signals integration with [Azure AD Identity Protection](../identity-protection/overview-identity-protection.md) allows Conditional Access policies to identify and remediate risky users and sign-in behavior.
5963
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)
60-
- Enables user application access and sessions to be monitored and controlled in real time, increasing visibility and control over access to and activities done within your cloud environment.
64+
- Enables user application access and sessions to be monitored and controlled in real time. This integration increases visibility and control over access to and activities done within your cloud environment.
6165

6266
## Common decisions
6367

6468
- Block access
6569
- Most restrictive decision
6670
- Grant access
67-
- Least restrictive decision, can still require one or more of the following options:
71+
- Less restrictive decision, can require one or more of the following options:
6872
- Require multifactor authentication
73+
- Require authentication strength
6974
- Require device to be marked as compliant
7075
- Require Hybrid Azure AD joined device
7176
- Require approved client app
72-
- Require app protection policy (preview)
77+
- Require app protection policy
78+
- Require password change
79+
- Require terms of use
7380

7481
## Commonly applied policies
7582

@@ -83,6 +90,20 @@ Many organizations have [common access concerns that Conditional Access policies
8390
- Blocking risky sign-in behaviors
8491
- Requiring organization-managed devices for specific applications
8592

93+
Administrators can create policies from scratch or start from a template policy in the portal or using the Microsoft Graph API.
94+
95+
## Administrator experience
96+
97+
Administrators with the [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator) role can manage policies in Azure AD.
98+
99+
Conditional Access is found in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access**.
100+
101+
:::image type="content" source="media/overview/conditional-access-overview.png" alt-text="Screenshot of the Conditional Access overview page in the Azure portal." lightbox="media/overview/conditional-access-overview.png":::
102+
103+
- The **Overview** page provides a summary of policy state, users, devices, and applications as well as general and security alerts with suggestions.
104+
- The **Coverage** page provides a synopsis of applications with and without Conditional Access policy coverage over the last seven days.
105+
- The **Monitoring** page allows administrators to see a graph of sign-ins that can be filtered to see potential gaps in policy coverage.
106+
86107
## License requirements
87108

88109
[!INCLUDE [Active Directory P1 license](../../../includes/active-directory-p1-license.md)]
@@ -93,7 +114,7 @@ Risk-based policies require access to [Identity Protection](../identity-protecti
93114

94115
Other products and features that may interact with Conditional Access policies require appropriate licensing for those products and features.
95116

96-
When licenses required for Conditional Access expire, policies aren't automatically disabled or deleted so customers can migrate away from Conditional Access policies without a sudden change in their security posture. Remaining policies can be viewed and deleted, but no longer updated.
117+
When licenses required for Conditional Access expire, policies aren't automatically disabled or deleted. This grants customers the ability to migrate away from Conditional Access policies without a sudden change in their security posture. Remaining policies can be viewed and deleted, but no longer updated.
97118

98119
[Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) help protect against identity-related attacks and are available for all customers.
99120

@@ -103,6 +124,3 @@ When licenses required for Conditional Access expire, policies aren't automatica
103124

104125
- [Building a Conditional Access policy piece by piece](concept-conditional-access-policies.md)
105126
- [Plan your Conditional Access deployment](plan-conditional-access.md)
106-
- [Learn about Identity Protection](../identity-protection/overview-identity-protection.md)
107-
- [Learn about Microsoft Defender for Cloud Apps](/cloud-app-security/what-is-cloud-app-security)
108-
- [Learn about Microsoft Intune](/intune/index)

0 commit comments

Comments
 (0)