Skip to content

Commit 3258555

Browse files
authored
Merge pull request #244123 from MicrosoftDocs/main
7/6/2023 AM Publish
2 parents 0f1c626 + 5c1b281 commit 3258555

File tree

177 files changed

+552
-382
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

177 files changed

+552
-382
lines changed

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,8 @@ Administrators can view user authentication methods in the Azure portal. Usable
107107

108108
Each authentication method can become non-usable for different reasons. For example, a Temporary Access Pass may expire, or FIDO2 security key may fail attestation. The portal will be updated to provide the reason for why the method is non-usable.
109109

110+
Authentication methods that are no longer available due to "Require re-register multifactor authentication" are also displayed here.
111+
110112
:::image type="content" border="true" source="media/concept-authentication-methods/non-usable.png" alt-text="Screenshot of non-usable authentication methods." :::
111113

112114

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,19 +32,19 @@ The following table details the different ways to get Azure AD Multi-Factor Auth
3232
| [Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business) and [EMS](https://www.microsoft.com/security/business/enterprise-mobility-security) or [Microsoft 365 E3 and E5](https://www.microsoft.com/microsoft-365/enterprise/compare-office-365-plans) | EMS E3, Microsoft 365 E3, and Microsoft 365 Business Premium includes Azure AD Premium P1. EMS E5 or Microsoft 365 E5 includes Azure AD Premium P2. You can use the same Conditional Access features noted in the following sections to provide multi-factor authentication to users. |
3333
| [Azure AD Premium P1](../fundamentals/active-directory-get-started-premium.md) | You can use [Azure AD Conditional Access](../conditional-access/howto-conditional-access-policy-all-users-mfa.md) to prompt users for multi-factor authentication during certain scenarios or events to fit your business requirements. |
3434
| [Azure AD Premium P2](../fundamentals/active-directory-get-started-premium.md) | Provides the strongest security position and improved user experience. Adds [risk-based Conditional Access](../conditional-access/howto-conditional-access-policy-risk.md) to the Azure AD Premium P1 features that adapts to user's patterns and minimizes multi-factor authentication prompts. |
35-
| [All Microsoft 365 plans](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans) | Azure AD Multi-Factor Authentication can be enabled all users using [security defaults](../fundamentals/concept-fundamentals-security-defaults.md). Management of Azure AD Multi-Factor Authentication is through the Microsoft 365 portal. For an improved user experience, upgrade to Azure AD Premium P1 or P2 and use Conditional Access. For more information, see [secure Microsoft 365 resources with multi-factor authentication](/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication). |
35+
| [All Microsoft 365 plans](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans) | Azure AD Multi-Factor Authentication can be enabled for all users using [security defaults](../fundamentals/concept-fundamentals-security-defaults.md). Management of Azure AD Multi-Factor Authentication is through the Microsoft 365 portal. For an improved user experience, upgrade to Azure AD Premium P1 or P2 and use Conditional Access. For more information, see [secure Microsoft 365 resources with multi-factor authentication](/microsoft-365/admin/security-and-compliance/set-up-multi-factor-authentication). |
3636
| [Office 365 free](https://www.microsoft.com/microsoft-365/enterprise/compare-office-365-plans)<br>[Azure AD free](../verifiable-credentials/how-to-create-a-free-developer-account.md) | You can use [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to prompt users for multi-factor authentication as needed but you don't have granular control of enabled users or scenarios, but it does provide that additional security step.<br /> Even when security defaults aren't used to enable multi-factor authentication for everyone, users assigned the *Azure AD Global Administrator* role can be configured to use multi-factor authentication. This feature of the free tier makes sure the critical administrator accounts are protected by multi-factor authentication. |
3737

3838
## Feature comparison based on licenses
3939

40-
The following table provides a list of the features that are available in the various versions of Azure AD for Multi-Factor Authentication. Plan out your needs for securing user authentication, then determine which approach meets those requirements. For example, although Azure AD Free provides security defaults that provide Azure AD Multi-Factor Authentication, only the mobile authenticator app can be used for the authentication prompt, not a phone call or SMS. This approach may be a limitation if you can't ensure the mobile authentication app is installed on a user's personal device. See [Azure AD Free tier](#azure-ad-free-tier) later in this topic for more details.
40+
The following table provides a list of the features that are available in the various versions of Azure AD for Multi-Factor Authentication. Plan out your needs for securing user authentication, then determine which approach meets those requirements. For example, although Azure AD Free provides security defaults that provide Azure AD Multi-Factor Authentication, only the mobile authenticator app can be used for the authentication prompt, including SMS and phone calls. This approach may be a limitation if you can't ensure the mobile authentication app is installed on a user's personal device. See [Azure AD Free tier](#azure-ad-free-tier) later in this topic for more details.
4141

4242
| Feature | Azure AD Free - Security defaults (enabled for all users) | Azure AD Free - Global Administrators only | Office 365 | Azure AD Premium P1 | Azure AD Premium P2 |
4343
| --- |:---:|:---:|:---:|:---:|:---:|
4444
| Protect Azure AD tenant admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) ||||
4545
| Mobile app as a second factor ||||||
46-
| Phone call as a second factor | | ||||
47-
| SMS as a second factor | |||||
46+
| Phone call as a second factor | | ||||
47+
| SMS as a second factor | |||||
4848
| Admin control over verification methods | |||||
4949
| Fraud alert | | | |||
5050
| MFA Reports | | | |||
@@ -70,7 +70,7 @@ Our recommended approach to enforce MFA is using [Conditional Access](../conditi
7070
| Configuration flexibility | || |
7171
| **Functionality** |
7272
| Exempt users from the policy | |||
73-
| Authenticate by phone call or SMS | |||
73+
| Authenticate by phone call or SMS | |||
7474
| Authenticate by Microsoft Authenticator and Software tokens ||||
7575
| Authenticate by FIDO2, Windows Hello for Business, and Hardware tokens | |||
7676
| Blocks legacy authentication protocols ||||

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -252,7 +252,7 @@ To provide load-balancing capabilities or for redundancy, repeat these steps on
252252
.\AzureMfaNpsExtnConfigSetup.ps1
253253
```
254254

255-
1. When prompted, sign in to Azure AD as an administrator.
255+
1. When prompted, sign in to Azure AD as a Global administrator.
256256
1. PowerShell prompts for your tenant ID. Use the *Tenant ID* GUID that you copied from the Azure portal in the prerequisites section.
257257
1. A success message is shown when the script is finished.
258258

articles/active-directory/authentication/tutorial-enable-cloud-sync-sspr-writeback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ Try the following operations to validate scenarios using password writeback. All
138138

139139
- If passwords for some user accounts aren't written back to the on-premises directory, make sure that inheritance isn't disabled for the account in the on-premises AD DS environment. Write permissions for passwords must be applied to descendant objects for the feature to work correctly.
140140

141-
- Password policies in the on-premises AD DS environment may prevent password resets from being correctly processed. If you are testing this feature and want to reset password for users more than once per day, the group policy for Minimum password age must be set to 0. This setting can be found under Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies within gpmc.msc.
141+
- Password policies in the on-premises AD DS environment may prevent password resets from being correctly processed. If you are testing this feature and want to reset password for users more than once per day, the group policy for Minimum password age must be set to 0. This setting can be found under Computer Configuration > Policies > Windows Settings > Security Settings > Account Policies > Password Policy within gpmc.msc.
142142

143143
- If you update the group policy, wait for the updated policy to replicate, or use the gpupdate /force command.
144144

articles/active-directory/azuread-dev/v1-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,4 +48,4 @@ The following articles provide detailed information about APIs, protocol message
4848

4949
See [Azure Active Directory developer platform videos](videos.md) for help migrating to the new Microsoft identity platform.
5050

51-
[!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
51+
[!INCLUDE [Help and support](../develop/includes/error-handling-and-tips/help-support-include.md)]

articles/active-directory/develop/console-quickstart-portal-nodejs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ ms.custom: mode-api, devx-track-js
148148
> > | `tokenRequest` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure Portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under **Expose an API** section in Azure Portal's Application Registration. |
149149
> > | `tokenResponse` | The response contains an access token for the scopes requested. |
150150
>
151-
> [!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
151+
> [!INCLUDE [Help and support](./includes/error-handling-and-tips/help-support-include.md)]
152152
>
153153
> ## Next steps
154154
>

articles/active-directory/develop/daemon-quickstart-portal-java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ ms.custom: aaddev, "scenarios:getting-started", "languages:Java", devx-track-jav
182182
> > |---------|---------|
183183
> > | `SCOPE` | Contains the scopes requested. For confidential clients, this should use the format similar to `{Application ID URI}/.default` to indicate that the scopes being requested are the ones statically defined in the app object set in the Azure portal (for Microsoft Graph, `{Application ID URI}` points to `https://graph.microsoft.com`). For custom web APIs, `{Application ID URI}` is defined under the **Expose an API** section in **App registrations** in the Azure portal.|
184184
>
185-
> [!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
185+
> [!INCLUDE [Help and support](./includes/error-handling-and-tips/help-support-include.md)]
186186
>
187187
> ## Next steps
188188
>

articles/active-directory/develop/daemon-quickstart-portal-netcore.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ ms.custom: devx-track-csharp, aaddev, identityplatformtop40, "scenarios:getting-
5353
> > [!div class="nextstepaction"]
5454
> > <button id="downloadsample" class="download-sample-button">Download the code sample</button>
5555
>
56-
> [!INCLUDE [active-directory-develop-path-length-tip](../../../includes/active-directory-develop-path-length-tip.md)]
56+
> [!INCLUDE [active-directory-develop-path-length-tip](./includes/error-handling-and-tips/path-length-tip.md)]
5757
>
5858
> > [!div class="sxs-lookup"]
5959
> > > [!NOTE]
@@ -153,7 +153,7 @@ ms.custom: devx-track-csharp, aaddev, identityplatformtop40, "scenarios:getting-
153153
>
154154
> For more information, see the [reference documentation for `AcquireTokenForClient`](/dotnet/api/microsoft.identity.client.confidentialclientapplication.acquiretokenforclient).
155155
>
156-
> [!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
156+
> [!INCLUDE [Help and support](./includes/error-handling-and-tips/help-support-include.md)]
157157
>
158158
> ## Next steps
159159
>

articles/active-directory/develop/daemon-quickstart-portal-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ ms.custom: aaddev, identityplatformtop40, devx-track-python, "scenarios:getting-
149149
>
150150
> For more information, please see the [reference documentation for `AcquireTokenForClient`](https://msal-python.readthedocs.io/en/latest/#msal.ConfidentialClientApplication.acquire_token_for_client).
151151
>
152-
> [!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
152+
> [!INCLUDE [Help and support](./includes/error-handling-and-tips/help-support-include.md)]
153153
>
154154
> ## Next steps
155155
>

articles/active-directory/develop/desktop-quickstart-portal-uwp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ ms.custom: aaddev, identityplatformtop40, "scenarios:getting-started", "language
5151
> > [!div class="nextstepaction"]
5252
> > <button id="downloadsample" class="download-sample-button">Download the code sample</button>
5353
>
54-
> [!INCLUDE [active-directory-develop-path-length-tip](../../../includes/active-directory-develop-path-length-tip.md)]
54+
> [!INCLUDE [active-directory-develop-path-length-tip](./includes/error-handling-and-tips/path-length-tip.md)]
5555
>
5656
>
5757
> #### Step 3: Your app is configured and ready to run
@@ -132,7 +132,7 @@ ms.custom: aaddev, identityplatformtop40, "scenarios:getting-started", "language
132132
> * `scopes` contains the scopes being requested, such as `{ "user.read" }` for Microsoft Graph or `{ "api://<Application ID>/access_as_user" }` for custom web APIs.
133133
> * `firstAccount` specifies the first user account in the cache (MSAL supports multiple users in a single app).
134134
>
135-
> [!INCLUDE [Help and support](../../../includes/active-directory-develop-help-support-include.md)]
135+
> [!INCLUDE [Help and support](./includes/error-handling-and-tips/help-support-include.md)]
136136
>
137137
> ## Next steps
138138
>

0 commit comments

Comments
 (0)