Skip to content

Commit 2f8c7ac

Browse files
committed
Merge branch 'main' into release-restorepoints-ga
2 parents c7c5b73 + 843ee48 commit 2f8c7ac

File tree

386 files changed

+2652
-1485
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

386 files changed

+2652
-1485
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -360,6 +360,11 @@
360360
"source_path_from_root": "/articles/azure-monitor/insights/azure-cli-application-insights-component.md" ,
361361
"redirect_url": "/cli/azure/monitor/app-insights",
362362
"redirect_document_id": false
363+
},
364+
{
365+
"source_path_from_root": "/articles/azure-monitor/insights/redis-cache-insights-overview.md" ,
366+
"redirect_url": "/azure/azure-cache-for-redis/redis-cache-insights-overview",
367+
"redirect_document_id": false
363368
}
364369
]
365370
}

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 31 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,12 @@
22
title: Passwordless sign-in with Microsoft Authenticator - Azure Active Directory
33
description: Enable passwordless sign-in to Azure AD using Microsoft Authenticator
44

5+
56
services: active-directory
67
ms.service: active-directory
78
ms.subservice: authentication
89
ms.topic: how-to
9-
ms.date: 06/23/2022
10+
ms.date: 07/14/2022
1011

1112

1213
ms.author: justinha
@@ -20,38 +21,54 @@ ms.collection: M365-identity-device-management
2021

2122
Microsoft Authenticator can be used to sign in to any Azure AD account without using a password. Microsoft Authenticator uses key-based authentication to enable a user credential that is tied to a device, where the device uses a PIN or biometric. [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-identity-verification) uses a similar technology.
2223

24+
2325
This authentication technology can be used on any device platform, including mobile. This technology can also be used with any app or website that integrates with Microsoft Authentication Libraries.
2426

25-
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app.png" alt-text="Example of a browser sign-in asking for the user to approve the sign-in.":::
27+
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app-next.png" alt-text="Screenshot that shows an example of a browser sign-in asking for the user to approve the sign-in.":::
2628

2729
People who enabled phone sign-in from Microsoft Authenticator see a message that asks them to tap a number in their app. No username or password is asked for. To complete the sign-in process in the app, a user must next take the following actions:
2830

2931
1. Enter the number they see on the login screen into Microsoft Authenticator dialog.
3032
1. Choose **Approve**.
3133
1. Provide their PIN or biometric.
3234

33-
## Prerequisites
35+
## Multiple accounts on iOS (preview)
3436

35-
To use passwordless phone sign in with Microsoft Authenticator, the following prerequisites must be met:
37+
You can enable passwordless phone sign-in for multiple accounts in Microsoft Authenticator on any supported iOS device. Consultants, students, and others with multiple accounts in Azure AD can add each account to Microsoft Authenticator and use passwordless phone sign-in for all of them from the same iOS device.
3638

37-
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help Microsoft Authenticator to prevent unauthorized access to accounts and stop fraudulent transactions. Microsoft Authenticator can either perform traditional MFA push notifications to a device that a user must approve or deny, or it can perform passwordless authentication that requires a user to type a matching number. Microsoft Authenticator automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
38-
- Latest version of Authenticator installed on devices running iOS 8.0 or greater, or Android 6.0 or greater.
39-
- The device on which Microsoft Authenticator is installed must be registered within the Azure AD tenant to an individual user.
39+
Previously, admins might not require passwordless sign-in for users with multiple accounts because it requires them to carry more devices for sign-in. By removing the limitation of one user sign-in from a device, admins can more confidently encourage users to register passwordless phone sign-in and use it as their default sign-in method.
4040

41-
> [!NOTE]
42-
> If you enabled Microsoft Authenticator for passwordless sign-in using Azure AD PowerShell, it was enabled for your entire directory. If you enable using this new method, it supercedes the PowerShell policy. We recommend you enable for all users in your tenant via the new *Authentication Methods* menu, otherwise users not in the new policy are no longer be able to sign in without a password.
41+
The Azure AD accounts can be in the same tenant or different tenants. Guest accounts aren't supported for multiple account sign-in from one device.
42+
43+
>[!NOTE]
44+
>Multiple accounts on iOS is currently in public preview. Some features might not be supported or have limited capabilities. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
45+
46+
## Prerequisites
47+
48+
To use passwordless phone sign-in with Microsoft Authenticator, the following prerequisites must be met:
4349

44-
## Enable passwordless authentication methods
50+
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
51+
- Latest version of Microsoft Authenticator installed on devices running iOS 12.0 or greater, or Android 6.0 or greater.
52+
- For Android, the device that runs Microsoft Authenticator must be registered to an individual user. We're actively working to enable multiple accounts on Android.
53+
- For iOS, the device must be registered with each tenant where it's used to sign in. For example, the following device must be registered with Contoso and Wingtiptoys to allow all accounts to sign in:
54+
55+
- [email protected] and bsandhu@wingtiptoys
56+
- For iOS, the option in Microsoft Authenticator to allow Microsoft to gather usage data must be enabled. It's not enabled by default. To enable it in Microsoft Authenticator, go to **Settings** > **Usage Data**.
57+
58+
:::image type="content" border="true" source="./media/howto-authentication-passwordless-phone/telemetry.png" alt-text="Screenshot os Usage Data in Microsoft Authenticator.":::
4559

4660
To use passwordless authentication in Azure AD, first enable the combined registration experience, then enable users for the passwordless method.
4761

48-
### Enable passwordless phone sign-in authentication methods
62+
## Enable passwordless phone sign-in authentication methods
4963

5064
Azure AD lets you choose which authentication methods can be used during the sign-in process. Users then register for the methods they'd like to use. The **Microsoft Authenticator** authentication method policy manages both the traditional push MFA method, as well as the passwordless authentication method.
5165

66+
> [!NOTE]
67+
> If you enabled Microsoft Authenticator passwordless sign-in using Azure AD PowerShell, it was enabled for your entire directory. If you enable using this new method, it supersedes the PowerShell policy. We recommend you enable for all users in your tenant via the new **Authentication Methods** menu, otherwise users who aren't in the new policy can't sign in without a password.
68+
5269
To enable the authentication method for passwordless phone sign-in, complete the following steps:
5370

54-
1. Sign in to the [Azure portal](https://portal.azure.com) with an *authentication policy administrator* account.
71+
1. Sign in to the [Azure portal](https://portal.azure.com) with an *Authentication Policy Administrator* account.
5572
1. Search for and select *Azure Active Directory*, then browse to **Security** > **Authentication methods** > **Policies**.
5673
1. Under **Microsoft Authenticator**, choose the following options:
5774
1. **Enable** - Yes or No
@@ -87,6 +104,7 @@ A user can start to utilize passwordless sign-in after all the following actions
87104
- An admin has enabled the user's tenant.
88105
- The user has added Microsoft Authenticator as a sign-in method.
89106

107+
90108
The first time a user starts the phone sign-in process, the user performs the following steps:
91109

92110
1. Enters their name at the sign-in page.
@@ -98,7 +116,7 @@ The user is then presented with a number. The app prompts the user to authentica
98116

99117
After the user has utilized passwordless phone sign-in, the app continues to guide the user through this method. However, the user will see the option to choose another method.
100118

101-
:::image type="content" border="true" source="./media/howto-authentication-passwordless-phone/web-sign-in-microsoft-authenticator-app.png" alt-text="Example of a browser sign-in using Microsoft Authenticator.":::
119+
:::image type="content" border="true" source="./media/howto-authentication-passwordless-phone/number.png" alt-text="Screenshot that shows an example of a browser sign-in using the Microsoft Authenticator app.":::
102120

103121
## Known Issues
104122

@@ -127,14 +145,6 @@ An end user can be enabled for multifactor authentication (MFA) through an on-pr
127145

128146
If the user attempts to upgrade multiple installations (5+) of Microsoft Authenticator with the passwordless phone sign-in credential, this change might result in an error.
129147

130-
### Device registration
131-
132-
Before you can create this new strong credential, there are prerequisites. One prerequisite is that the device on which Microsoft Authenticator is installed must be registered within the Azure AD tenant to an individual user.
133-
134-
Currently, a device can only be enabled for passwordless sign-in in a single tenant. This limit means that only one work or school account in Microsoft Authenticator can be enabled for phone sign-in.
135-
136-
> [!NOTE]
137-
> Device registration is not the same as device management or mobile device management (MDM). Device registration only associates a device ID and a user ID together, in the Azure AD directory.
138148

139149
## Next steps
140150

703 KB
Loading
3.97 MB
Loading
487 KB
Loading
Loading
127 KB
Loading

articles/active-directory/cloud-infrastructure-entitlement-management/usage-analytics-users.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Filters can be applied in one, two, or all three categories depending on the typ
108108

109109
1. From the **Authorization System Type** dropdown, select the authorization system you want to use: **AWS**, **Azure**, or **GCP**.
110110
1. From the **Authorization System** dropdown, select from a **List** of accounts and **Folders**.
111-
1. From the **Identity Subtype**, select the type of user: **All**, **ED**, **Local**, or **Cross Account**.
111+
1. From the **Identity Subtype**, select the type of user: **All**, **ED** (Enterprise Directory), **Local**, or **Cross Account**.
112112
1. Select **Apply** to run your query and display the information you selected.
113113

114114
Select **Reset filter** to discard your changes.
@@ -158,4 +158,4 @@ You can filter user details by type of user, user role, app, or service used, or
158158
- To view assigned permissions and usage of the group and the group members, see [View analytic information about groups](usage-analytics-groups.md).
159159
- To view active resources, see [View analytic information about active resources](usage-analytics-active-resources.md).
160160
- To view the permission usage of access keys for a given user, see [View analytic information about access keys](usage-analytics-access-keys.md).
161-
- To view assigned permissions and usage of the serverless functions, see [View analytic information about serverless functions](usage-analytics-serverless-functions.md).
161+
- To view assigned permissions and usage of the serverless functions, see [View analytic information about serverless functions](usage-analytics-serverless-functions.md).

articles/active-directory/develop/msal-node-migration.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.custom: has-adal-ref
2121

2222
## Prerequisites
2323

24-
- Node version 10, 12 or 14. See the [note on version support](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node#node-version-support)
24+
- Node version 10, 12, 14, 16 or 18. See the [note on version support](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node#node-version-support)
2525

2626
## Update app registration settings
2727

@@ -373,16 +373,19 @@ const cca = new msal.ConfidentialClientApplication(config);
373373

374374
const refreshTokenRequest = {
375375
refreshToken: "", // your previous refresh token here
376-
scopes: ["user.read"],
376+
scopes: ["https://graph.microsoft.com/.default"],
377+
forceCache: true,
377378
};
378379

379380
cca.acquireTokenByRefreshToken(refreshTokenRequest).then((response) => {
380-
console.log(JSON.stringify(response));
381+
console.log(response);
381382
}).catch((error) => {
382-
console.log(JSON.stringify(error));
383+
console.log(error);
383384
});
384385
```
385386

387+
For more information, please refer to the [ADAL Node to MSAL Node migration sample](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/samples/msal-node-samples/refresh-token).
388+
386389
> [!NOTE]
387390
> We recommend you to destroy the older ADAL Node token cache once you utilize the still valid refresh tokens to get a new set of tokens using the MSAL Node's `acquireTokenByRefreshToken` method as shown above.
388391
@@ -419,7 +422,7 @@ var adal = require('adal-node');
419422
// Authentication parameters
420423
var clientId = 'Enter_the_Application_Id_Here';
421424
var clientSecret = 'Enter_the_Client_Secret_Here';
422-
var tenant = 'common';
425+
var tenant = 'Enter_the_Tenant_Info_Here';
423426
var authorityUrl = 'https://login.microsoftonline.com/' + tenant;
424427
var redirectUri = 'http://localhost:3000/redirect';
425428
var resource = 'https://graph.microsoft.com';
@@ -501,7 +504,7 @@ const msal = require('@azure/msal-node');
501504
const config = {
502505
auth: {
503506
clientId: "Enter_the_Application_Id_Here",
504-
authority: "https://login.microsoftonline.com/common",
507+
authority: "https://login.microsoftonline.com/Enter_the_Tenant_Info_Here",
505508
clientSecret: "Enter_the_Client_Secret_Here"
506509
},
507510
system: {

articles/active-directory/fundamentals/active-directory-access-create-new-tenant.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22
title: Quickstart - Access & create new tenant - Azure AD
33
description: Instructions about how to find Azure Active Directory and how to create a new tenant for your organization.
44
services: active-directory
5-
author: ajburnle
6-
manager: karenhoran
5+
author: barclayn
6+
manager: rkarlin
77
ms.service: active-directory
88
ms.subservice: fundamentals
99
ms.workload: identity
1010
ms.topic: quickstart
1111
ms.date: 12/22/2021
12-
ms.author: ajburnle
12+
ms.author: barclayn
1313
ms.custom: it-pro, seodec18, fasttrack-edit, mode-other
1414
ms.collection: M365-identity-device-management
1515
---

0 commit comments

Comments
 (0)