Skip to content

Commit 2ca40ee

Browse files
authored
Merge branch 'main' into master
2 parents 09ef8d1 + d1f9b42 commit 2ca40ee

File tree

248 files changed

+2128
-1345
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

248 files changed

+2128
-1345
lines changed

articles/active-directory-b2c/aad-sspr-technical-profile.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/23/2020
12+
ms.date: 11/08/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -26,8 +26,6 @@ This technical profile:
2626
- Uses the Azure AD SSPR service to generate and send a code to an email address, and then verifies the code.
2727
- Validates an email address via a verification code.
2828

29-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
30-
3129
## Protocol
3230

3331
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C:

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/27/2022
12+
ms.date: 11/08/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -22,7 +22,9 @@ Azure Active Directory B2C [user flows and custom policies](user-flow-overview.m
2222
## Terms for features in public preview
2323

2424
- We encourage you to use public preview features for evaluation purposes only.
25+
2526
- [Service level agreements (SLAs)](https://azure.microsoft.com/support/legal/sla/active-directory-b2c) don't apply to public preview features.
27+
2628
- Support requests for public preview features can be submitted through regular support channels.
2729

2830
## User flows
@@ -156,7 +158,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
156158
| ------- | :--: | ----- |
157159
| [MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods) | GA | Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
158160
| [Phone factor authentication](phone-factor-technical-profile.md) | GA | |
159-
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | Preview | |
161+
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | GA | |
160162
| [One-time password](one-time-password-technical-profile.md) | GA | |
161163
| [Azure Active Directory](active-directory-technical-profile.md) as local directory | GA | |
162164
| [Predicate validations](predicates.md) | GA | For example, password complexity. |

articles/active-directory-b2c/multi-factor-auth-technical-profile.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/09/2021
12+
ms.date: 11/08/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -18,7 +18,6 @@ ms.subservice: B2C
1818

1919
Azure Active Directory B2C (Azure AD B2C) provides support for verifying a phone number by using a verification code, or verifying a Time-based One-time Password (TOTP) code.
2020

21-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
2221

2322
## Protocol
2423

articles/active-directory/authentication/howto-mfa-app-passwords.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 11/01/2022
9+
ms.date: 11/08/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -24,7 +24,7 @@ Modern authentication is supported for the Microsoft Office 2013 clients and lat
2424
This article shows you how to use app passwords for legacy applications that don't support multi-factor authentication prompts.
2525

2626
>[!NOTE]
27-
> App passwords don't work with Conditional Access based multi-factor authentication policies and modern authentication. App passwords only work with legacy authentication protocols such as IMAP and SMTP.
27+
>App passwords don't work for accounts that are required to use modern authentication.
2828
2929
## Overview and considerations
3030

articles/active-directory/conditional-access/overview.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: overview
9-
ms.date: 08/05/2022
9+
ms.date: 11/07/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -93,6 +93,10 @@ Risk-based policies require access to [Identity Protection](../identity-protecti
9393

9494
Other products and features that may interact with Conditional Access policies require appropriate licensing for those products and features.
9595

96+
When licenses required for Conditional Access expire, policies aren't automatically disabled or deleted so customers can migrate away from Conditional Access policies without a sudden change in their security posture. Remaining policies can be viewed and deleted, but no longer updated.
97+
98+
[Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) help protect against identity-related attacks and are available for all customers.
99+
96100
## Next steps
97101

98102
- [Building a Conditional Access policy piece by piece](concept-conditional-access-policies.md)

articles/active-directory/external-identities/b2b-tutorial-require-mfa.md

Lines changed: 30 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -11,17 +11,20 @@ ms.date: 01/07/2022
1111
ms.author: mimart
1212
author: msmimart
1313
manager: CelesteDG
14-
ms.custom: "it-pro, seo-update-azuread-jan"
14+
ms.custom: "engagement-fy23, it-pro, seo-update-azuread-jan"
1515
ms.collection: M365-identity-device-management
16+
17+
# Customer intent: As a tenant administrator, I want to set up MFA requirement for B2B guest users to protect my apps and resources.
1618
---
1719

1820
# Tutorial: Enforce multi-factor authentication for B2B guest users
1921

20-
When collaborating with external B2B guest users, it’s a good idea to protect your apps with multi-factor authentication (MFA) policies. Then external users will need more than just a user name and password to access your resources. In Azure Active Directory (Azure AD), you can accomplish this goal with a Conditional Access policy that requires MFA for access. MFA policies can be enforced at the tenant, app, or individual guest user level, the same way that they are enabled for members of your own organization. The resource tenant is always responsible for Azure AD Multi-Factor Authentication for users, even if the guest user’s organization has Multi-Factor Authentication capabilities.
22+
When collaborating with external B2B guest users, it’s a good idea to protect your apps with multi-factor authentication (MFA) policies. Then external users will need more than just a user name and password to access your resources. In Azure Active Directory (Azure AD), you can accomplish this goal with a Conditional Access policy that requires MFA for access. MFA policies can be enforced at the tenant, app, or individual guest user level, the same way that they're enabled for members of your own organization. The resource tenant is always responsible for Azure AD Multi-Factor Authentication for users, even if the guest user’s organization has Multi-Factor Authentication capabilities.
2123

2224
Example:
2325

24-
![Diagram showing a guest user signing into a company's apps](media/tutorial-mfa/aad-b2b-mfa-example.png)
26+
:::image type="content" source="media/tutorial-mfa/aad-b2b-mfa-example.png" alt-text="Diagram showing a guest user signing into a company's apps.":::
27+
2528

2629
1. An admin or employee at Company A invites a guest user to use a cloud or on-premises application that is configured to require MFA for access.
2730
1. The guest user signs in with their own work, school, or social identity.
@@ -34,6 +37,7 @@ Example:
3437
In this tutorial, you will:
3538

3639
> [!div class="checklist"]
40+
>
3741
> - Test the sign-in experience before MFA setup.
3842
> - Create a Conditional Access policy that requires MFA for access to a cloud app in your environment. In this tutorial, we’ll use the Microsoft Azure Management app to illustrate the process.
3943
> - Use the What If tool to simulate MFA sign-in.
@@ -46,29 +50,29 @@ If you don’t have an Azure subscription, create a [free account](https://azure
4650

4751
To complete the scenario in this tutorial, you need:
4852

49-
- **Access to Azure AD Premium edition**, which includes Conditional Access policy capabilities. To enforce MFA, you need to create an Azure AD Conditional Access policy. Note that MFA policies are always enforced at your organization, regardless of whether the partner has MFA capabilities.
53+
- **Access to Azure AD Premium edition**, which includes Conditional Access policy capabilities. To enforce MFA, you need to create an Azure AD Conditional Access policy. MFA policies are always enforced at your organization, regardless of whether the partner has MFA capabilities.
5054
- **A valid external email account** that you can add to your tenant directory as a guest user and use to sign in. If you don't know how to create a guest account, see [Add a B2B guest user in the Azure portal](add-users-administrator.md).
5155

5256
## Create a test guest user in Azure AD
5357

5458
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Azure AD administrator.
5559
1. In the Azure portal, select **Azure Active Directory**.
5660
1. In the left menu, under **Manage**, select **Users**.
57-
1. Select **New guest user**.
61+
1. Select **New user**, and then select **Invite external user**.
5862

59-
![Screenshot showing where to select the New guest user option](media/tutorial-mfa/tutorial-mfa-user-3.png)
63+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-new-user.png" alt-text="Screenshot showing where to select the new guest user option.":::
6064

6165
1. Under **Identity**, enter the email address of the external user. Optionally, include a name and welcome message.
6266

63-
![Screenshot showing where to enter the guest invitation message](media/tutorial-mfa/tutorial-mfa-user-4.png)
67+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-new-user-identity.png" alt-text="Screenshot showing where to enter the guest email.":::
6468

6569
1. Select **Invite** to automatically send the invitation to the guest user. A **Successfully invited user** message appears.
6670
1. After you send the invitation, the user account is automatically added to the directory as a guest.
6771

6872
## Test the sign-in experience before MFA setup
6973

7074
1. Use your test user name and password to sign in to your [Azure portal](https://portal.azure.com/).
71-
1. Note that you’re able to access the Azure portal using just your sign-in credentials. No additional authentication is required.
75+
1. You should be able to access the Azure portal using only your sign-in credentials. No other authentication is required.
7276
1. Sign out.
7377

7478
## Create a Conditional Access policy that requires MFA
@@ -80,56 +84,55 @@ To complete the scenario in this tutorial, you need:
8084
1. On the **Conditional Access** page, in the toolbar on the top, select **New policy**.
8185
1. On the **New** page, in the **Name** textbox, type **Require MFA for B2B portal access**.
8286
1. In the **Assignments** section, choose the link under **Users and groups**.
83-
1. On the **Users and groups** page, choose **Select users and groups**, and then choose **All guest and external users**.
87+
1. On the **Users and groups** page, choose **Select users and groups**, and then choose **Guest or external users**. You can assign the policy to different [external user types](authentication-conditional-access.md#assigning-conditional-access-policies-to-external-user-types-preview), built-in [directory roles](../conditional-access/concept-conditional-access-users-groups.md#include-users), or users and groups.
88+
89+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-user-access.png" alt-text="Screenshot showing selecting all guest users.":::
8490

85-
![Screenshot showing selecting all guest users](media/tutorial-mfa/tutorial-mfa-policy-6.png)
8691
1. In the **Assignments** section, choose the link under **Cloud apps or actions**.
8792
1. Choose **Select apps**, and then choose the link under **Select**.
8893

89-
![Screenshot showing the Cloud apps page and the Select option](media/tutorial-mfa/tutorial-mfa-policy-10.png)
94+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-app-access.png" alt-text="Screenshot showing the Cloud apps page and the Select option." lightbox="media/tutorial-mfa/tutorial-mfa-app-access.png":::
9095

91-
1. On the **Select** page, choose **Microsoft Azure Management**, and then choose **Select**.
96+
1. On the **Select** page, choose **Microsoft Azure Management**, and then choose **Select**.
9297

93-
![Screenshot that highlights the Microsoft Azure Management option.](media/tutorial-mfa/tutorial-mfa-policy-11.png)
98+
1. On the **New** page, in the **Access controls** section, choose the link under **Grant**.
99+
1. On the **Grant** page, choose **Grant access**, select the **Require multi-factor authentication** check box, and then choose **Select**.
94100

95-
1. On the **New** page, in the **Access controls** section, choose the link under **Grant**.
96-
1. On the **Grant** page, choose **Grant access**, select the **Require multi-factor authentication** check box, and then choose **Select**.
101+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-grant-access.png" alt-text="Screenshot showing the Require multi-factor authentication option.":::
97102

98-
![Screenshot showing the Require multi-factor authentication option](media/tutorial-mfa/tutorial-mfa-policy-13.png)
99103

100-
1. Under **Enable policy**, select **On**.
104+
1. Under **Enable policy**, select **On**.
101105

102-
![Screenshot showing the Enable policy option set to On](media/tutorial-mfa/tutorial-mfa-policy-14.png)
106+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-enable-policy.png" alt-text="Screenshot showing the Enable policy option set to On.":::
103107

104-
1. Select **Create**.
108+
1. Select **Create**.
105109

106110
## Use the What If option to simulate sign-in
107111

108112
1. On the **Conditional Access | Policies** page, select **What If**.
109113

110-
![Screenshot that highlights where to select the What if option on the Conditional Access - Policies page.](media/tutorial-mfa/tutorial-mfa-whatif-1.png)
114+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-what-if.png" alt-text="Screenshot that highlights where to select the What if option on the Conditional Access - Policies page.":::
111115

112116
1. Select the link under **User**.
113117
1. In the search box, type the name of your test guest user. Choose the user in the search results, and then choose **Select**.
114118

115-
![Screenshot showing a guest user selected](media/tutorial-mfa/tutorial-mfa-whatif-2.png)
119+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-what-if-user.png" alt-text="Screenshot showing a guest user selected.":::
116120

117-
1. Select the link under **Cloud apps, actions, or authentication content**.
118-
. Choose **Select apps**, and then choose the link under **Select**.
121+
1. Select the link under **Cloud apps, actions, or authentication content**. Choose **Select apps**, and then choose the link under **Select**.
119122

120-
![Screenshot showing the Microsoft Azure Management app selected](media/tutorial-mfa/tutorial-mfa-whatif-3.png)
123+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-what-if-app.png" alt-text="Screenshot showing the Microsoft Azure Management app selected." lightbox="media/tutorial-mfa/tutorial-mfa-what-if-app.png":::
121124

122125
1. On the **Cloud apps** page, in the applications list, choose **Microsoft Azure Management**, and then choose **Select**.
123126
1. Choose **What If**, and verify that your new policy appears under **Evaluation results** on the **Policies that will apply** tab.
124127

125-
![Screenshot showing where to select the What if option](media/tutorial-mfa/tutorial-mfa-whatif-4.png)
128+
:::image type="content" source="media/tutorial-mfa/tutorial-mfa-whatif-4.png" alt-text="Screenshot showing the results of the What If evaluation.":::
126129

127130
## Test your Conditional Access policy
128131

129132
1. Use your test user name and password to sign in to your [Azure portal](https://portal.azure.com/).
130-
1. You should see a request for additional authentication methods. Note that it could take some time for the policy to take effect.
133+
1. You should see a request for additional authentication methods. It can take some time for the policy to take effect.
131134

132-
![Screenshot showing the More information required message](media/tutorial-mfa/mfa-required.png)
135+
:::image type="content" source="media/tutorial-mfa/mfa-required.PNG" alt-text="Screenshot showing the More information required message.":::
133136

134137
> [!NOTE]
135138
> You also can configure [cross-tenant access settings](cross-tenant-access-overview.md) to trust the MFA from the Azure AD home tenant. This allows external Azure AD users to use the MFA registered in their own tenant rather than register in the resource tenant.
32.7 KB
Loading
7.08 KB
Loading
23.2 KB
Loading
60 KB
Loading

0 commit comments

Comments
 (0)