You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/social-transformations.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,10 +16,10 @@ ms.subservice: B2C
16
16
17
17
# Social accounts claims transformations
18
18
19
-
In Azure Active Directory B2C (Azure AD B2C), social account identities are stored in a `userIdentities` attribute of a **alternativeSecurityIdCollection** claim type. Each item in the **alternativeSecurityIdCollection** specifies the issuer (identity provider name, such as facebook.com) and the `issuerUserId`, which is a unique user identifier for the issuer.
19
+
In Azure Active Directory B2C (Azure AD B2C), social account identities are stored in a `alternativeSecurityIds` attribute of a **alternativeSecurityIdCollection** claim type. Each item in the **alternativeSecurityIdCollection** specifies the issuer (identity provider name, such as facebook.com) and the `issuerUserId`, which is a unique user identifier for the issuer.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -229,6 +229,12 @@ For the next test scenario, configure the authentication policy where the **poli
229
229
230
230
- The **Additional Details** tab shows **User certificate subject name** as the attribute name but it is actually "User certificate binding identifier". It is the value of the certificate field that username binding is configured to use.
231
231
232
+
- There is a double prompt for iOS because iOS only supports pushing certificates to a device storage. When an organization pushes user certificates to an iOS device through Mobile Device Management (MDM) or when a user accesses first-party or native apps, there is no access to device storage. Only Safari can access device storage.
233
+
234
+
When an iOS client sees a client TLS challenge and the user clicks **Sign in with certificate**, iOS client knows it cannot handle it and sends a completely new authorization request using the Safari browser. The user clicks **Sign in with certificate** again, at which point Safari which has access to certificates for authentication in device storage. This requires users to click **Sign in with certificate** twice, once in app’s WKWebView and once in Safari’s System WebView.
235
+
236
+
We are aware of the UX experience issue and are working to fix this on iOS and to have a seamless UX experience.
237
+
232
238
## Next steps
233
239
234
240
-[Overview of Azure AD CBA](concept-certificate-based-authentication.md)
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Step-by-step guidance to move from Azure MFA Server on-premises to
4
4
ms.service: active-directory
5
5
ms.subservice: authentication
6
6
ms.topic: how-to
7
-
ms.date: 04/07/2022
7
+
ms.date: 04/21/2022
8
8
ms.author: BaSelden
9
9
author: BarbaraSelden
10
10
manager: martinco
@@ -174,7 +174,7 @@ This section covers final steps before migrating user phone numbers.
174
174
175
175
### Set federatedIdpMfaBehavior to enforceMfaByFederatedIdp
176
176
177
-
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain has a Microsoft Graph PowerShell security setting named **federatedIdpMfaBehavior**. You can set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` so Azure AD accepts MFA that's performed by the federated identity provider. If the federated identity provider didn't perform MFA, Azure AD redirects the request to the federated identity provider to perform MFA. For more information, see [federatedIdpMfaBehavior](/graph/api/resources/federatedIdpMfaBehavior?view=graph-rest-beta&preserve-view=true).
177
+
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain has a Microsoft Graph PowerShell security setting named **federatedIdpMfaBehavior**. You can set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` so Azure AD accepts MFA that's performed by the federated identity provider. If the federated identity provider didn't perform MFA, Azure AD redirects the request to the federated identity provider to perform MFA. For more information, see [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values).
178
178
179
179
>[!NOTE]
180
180
> The **federatedIdpMfaBehavior** setting is an evolved version of the **SupportsMfa** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/msonline/set-msoldomainfederationsettings).
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/2-secure-access-current-state.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,22 +2,22 @@
2
2
title: Discover the current state of external collaboration with Azure Active Directory
3
3
description: Learn methods to discover the current state of your collaboration.
4
4
services: active-directory
5
-
author: BarbaraSelden
5
+
author: gargi-sinha
6
6
manager: martinco
7
7
ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.subservice: fundamentals
10
10
ms.topic: conceptual
11
11
ms.date: 12/18/2020
12
-
ms.author: baselden
12
+
ms.author: gasinh
13
13
ms.reviewer: ajburnle
14
14
ms.custom: "it-pro, seodec18"
15
15
ms.collection: M365-identity-device-management
16
16
---
17
17
18
18
# Discover the current state of external collaboration in your organization
19
19
20
-
Before discovering the current state of your external collaboration, you should [determine your desired security posture](1-secure-access-posture.md). You'll considered your organization’s needs for centralized vs. delegated control, and any relevant governance, regulatory, and compliance targets.
20
+
Before discovering the current state of your external collaboration, you should [determine your desired security posture](1-secure-access-posture.md). You'll consider your organization’s needs for centralized vs. delegated control, and any relevant governance, regulatory, and compliance targets.
21
21
22
22
Individuals in your organization are probably already collaborating with users from other organizations. Collaboration can be through features in productivity applications like Microsoft 365, by emailing, or by otherwise sharing resources with external users. The pillars of your governance plan will form as you discover:
23
23
@@ -35,17 +35,19 @@ To find users who are currently collaborating, review the [Microsoft 365 audit l
35
35
36
36
External users may be [Azure AD B2B users](../external-identities/what-is-b2b.md) (preferable) with partner-managed credentials, or external users with locally provisioned credentials. These users are typically (but not always) marked with a UserType of Guest. You can enumerate guest users through the [Microsoft Graph API](/graph/api/user-list?tabs=http), [PowerShell](/graph/api/user-list?tabs=http), or the [Azure portal](../enterprise-users/users-bulk-download.md).
37
37
38
+
There are also tools specifically designed to identify existing Azure AD B2B collaboration such as identifying external Azure AD tenants, and which external users are accessing what applications. These tools include a [PowerShell module](https://github.com/AzureAD/MSIdentityTools/wiki/Get-MSIDCrossTenantAccessActivity) and an [Azure Monitor workbook](../reports-monitoring/workbook-cross-tenant-access-activity.md).
39
+
38
40
### Use email domains and companyName property
39
41
40
42
External organizations can be determined by the domain names of external user email addresses. If consumer identity providers such as Google are supported, this may not be possible. In this case we recommend that you write the companyName attribute to clearly identify the user’s external organization.
41
43
42
-
### Use allow or deny lists
44
+
### Use allow or blocklists
43
45
44
-
Consider whether your organization wants to allow collaboration with only specific organizations. Alternatively, consider if your organization wants to block collaboration with specific organizations. At the tenant level, there is an [allow or deny list](../external-identities/allow-deny-list.md), which can be used to control overall B2B invitations and redemptions regardless of source (such as Microsoft Teams, Microsoft SharePoint, or the Azure portal).
46
+
Consider whether your organization wants to allow collaboration with only specific organizations. Alternatively, consider if your organization wants to block collaboration with specific organizations. At the tenant level, there is an [allow or blocklist](../external-identities/allow-deny-list.md), which can be used to control overall B2B invitations and redemptions regardless of source (such as Microsoft Teams, Microsoft SharePoint, or the Azure portal).
45
47
46
48
If you’re using entitlement management, you can also scope access packages to a subset of your partners by using the Specific connected organizations setting as shown below.
47
49
48
-

50
+

Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/3-secure-access-plan.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,20 +2,20 @@
2
2
title: Create a security plan for external access to Azure Active Directory
3
3
description: Plan the security for external access to your organization's resources..
4
4
services: active-directory
5
-
author: BarbaraSelden
5
+
author: gargi-sinha
6
6
manager: martinco
7
7
ms.service: active-directory
8
8
ms.workload: identity
9
9
ms.subservice: fundamentals
10
10
ms.topic: conceptual
11
11
ms.date: 12/18/2020
12
-
ms.author: baselden
12
+
ms.author: gasinh
13
13
ms.reviewer: ajburnle
14
14
ms.custom: "it-pro, seodec18"
15
15
ms.collection: M365-identity-device-management
16
16
---
17
17
18
-
# 3. Create a security plan for external access
18
+
# Create a security plan for external access
19
19
20
20
Now that you have [determined your desired security posture security posture for external access](1-secure-access-posture.md) and [discovered your current collaboration state](2-secure-access-current-state.md), you can create an external user security and governance plan.
21
21
@@ -37,10 +37,12 @@ There are multiple ways to group resources for access.
37
37
38
38
* Microsoft Teams groups files, conversation threads, and other resources in one place. You should formulate an external access strategy for Microsoft Teams. See [Secure access to Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md).
39
39
40
-
* Entitlement Management Access Packages enable you to create a single package of applications and other resources to which you can grant access.
40
+
* Entitlement Management Access Packages enable you to create and delegate management of packages of Applications, Groups, Teams, SharePoint sites, and other resources to which you can grant access.
41
41
42
42
* Conditional Access policies can be applied to up to 250 applications with the same access requirements.
43
43
44
+
* Cross Tenant Access Settings Inbound Access can define what application groups of external users are allowed to access.
45
+
44
46
However you will manage access, you must document which applications should be grouped together. Considerations should include:
45
47
46
48
***Risk profile**. What is the risk to your business if a bad actor gained access to an application? Consider coding each application as high, medium, or low risk. Be cautious about grouping high-risk applications with low-risk ones.
@@ -73,7 +75,7 @@ For each grouping of applications and resources that you want to make accessible
73
75
74
76
This type of governance plan can and should also be completed for internal access as well.
75
77
76
-
## Document sign-in conditions for external users.
78
+
## Document sign-in conditions for external users
77
79
78
80
As part of your plan you must determine the sign-in requirements for your external users as they access resources. Sign-in requirements are often based on the risk profile of the resources, and the risk assessment of the users’ sign-in.
79
81
@@ -88,7 +90,7 @@ Sign-in conditions are configured in [Azure AD Conditional Access](../conditiona
88
90
| High risk| Require MFA always for external users |
89
91
90
92
91
-
Today, you can [enforce multi-factor authentication for B2B users in your tenant](../external-identities/b2b-tutorial-require-mfa.md).
93
+
Today, you can [enforce multi-factor authentication for B2B users in your tenant](../external-identities/b2b-tutorial-require-mfa.md). You can also trust the MFA from external tenants to satisfy your MFA requirements using [Cross Tenant Access Settings](../external-identities/cross-tenant-access-settings-b2b-collaboration.md#modify-inbound-access-settings).
92
94
93
95
**User- and device-based sign in conditions**.
94
96
@@ -99,7 +101,7 @@ Today, you can [enforce multi-factor authentication for B2B users in your tenant
99
101
| Identity protection shows high risk| Require user to change password |
100
102
| Network location| Require sign in from a specific IP address range to highly confidential projects |
101
103
102
-
Today, to use device state as an input to a policy, the device must be registered or joined to your tenant.
104
+
Today, to use device state as an input to a policy, the device must be either be registered or joined to your tenant or [Cross Tenant Access Settings](../external-identities/cross-tenant-access-settings-b2b-collaboration.md#modify-inbound-access-settings) must be configured to trust the device claims from the home tenant.
103
105
104
106
[Identity Protection risk-based policies](../conditional-access/howto-conditional-access-policy-risk.md) can be used. However, issues must be mitigated in the user’s home tenant.
105
107
@@ -135,8 +137,6 @@ While your policies will be highly customized to your needs, consider the follow
135
137
136
138
* Assess access needs and take action at the end of every project with external users.
137
139
138
-
139
-
140
140
## Determine your access control methods
141
141
142
142
Now that you know what you want to control access to, how those assets should be grouped for common access, and required sign-in and access review policies, you can decide on how to accomplish your plan.
@@ -223,4 +223,4 @@ See the following articles on securing external access to resources. We recommen
223
223
224
224
8.[Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
225
225
226
-
9.[Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
226
+
9.[Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
0 commit comments