Skip to content

Commit 33a7497

Browse files
Merge branch 'MicrosoftDocs:main' into main
2 parents 58b3136 + 608f277 commit 33a7497

File tree

41 files changed

+512
-243
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

41 files changed

+512
-243
lines changed

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,10 @@ description: Topic that shows how to configure Azure AD certificate-based authen
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: how-to
8-
ms.date: 01/29/2023
8+
ms.date: 01/30/2023
99

1010
ms.author: justinha
11-
author: vimrang
11+
author: justinha
1212
manager: amycolannino
1313
ms.reviewer: vimrang
1414

@@ -134,7 +134,7 @@ To enable the certificate-based authentication in the Azure portal, complete the
134134
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Authentication Policy Administrator.
135135
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
136136
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
137-
1. Under **Basics**, select **Yes** to enable CBA.
137+
1. Under **Enable and Target**, click **Enable**.
138138
1. Click **All users**, or click **Add groups** to select specific groups.
139139

140140
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/enable.png" alt-text="Screenshot of how to enable CBA.":::

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/03/2023
9+
ms.date: 01/30/2023
1010

1111
ms.author: justinha
1212
author: calui
@@ -43,8 +43,8 @@ Here's what you need to know about email as an alternate login ID:
4343
* If the non-UPN email in use becomes stale (no longer belongs to the user), these claims will return the UPN instead.
4444
* The feature supports managed authentication with Password Hash Sync (PHS) or Pass-Through Authentication (PTA).
4545
* There are two options for configuring the feature:
46-
* [Home Realm Discovery (HRD) policy](#enable-user-sign-in-with-an-email-address) - Use this option to enable the feature for the entire tenant. Global administrator privileges required.
47-
* [Staged rollout policy](#enable-staged-rollout-to-test-user-sign-in-with-an-email-address) - Use this option to test the feature with specific Azure AD groups. Global administrator privileges required. When you first add a security group for staged rollout, you're limited to 200 users to avoid a UX time-out. After you've added the group, you can add more users directly to it, as required.
46+
* [Home Realm Discovery (HRD) policy](#enable-user-sign-in-with-an-email-address) - Use this option to enable the feature for the entire tenant. Global Administrator, Application Administrator, or Cloud Application Administrator role is required.
47+
* [Staged rollout policy](#enable-staged-rollout-to-test-user-sign-in-with-an-email-address) - Use this option to test the feature with specific Azure AD groups. Global Administrator privileges required. When you first add a security group for staged rollout, you're limited to 200 users to avoid a UX time-out. After you've added the group, you can add more users directly to it, as required.
4848

4949
## Preview limitations
5050

@@ -132,11 +132,11 @@ Email as an alternate login ID applies to [Azure AD B2B collaboration](../extern
132132
133133
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
134134

135-
During preview, you currently need *global administrator* permissions to enable sign-in with email as an alternate login ID. You can use either Azure portal or PowerShell to set up the feature.
135+
During preview, you currently need *Global Administrator* permissions to enable sign-in with email as an alternate login ID. You can use either Azure portal or PowerShell to set up the feature.
136136

137137
### Azure portal
138138

139-
1. Sign in to the [Azure portal][azure-portal] as a *global administrator*.
139+
1. Sign in to the [Azure portal][azure-portal] as a *Global Administrator*.
140140
1. Search for and select **Azure Active Directory**.
141141
1. From the navigation menu on the left-hand side of the Azure Active Directory window, select **Azure AD Connect > Email as alternate login ID**.
142142

@@ -156,7 +156,7 @@ With the policy applied, it can take up to 1 hour to propagate and for users to
156156
157157
Once users with the *ProxyAddresses* attribute applied are synchronized to Azure AD using Azure AD Connect, you need to enable the feature for users to sign-in with email as an alternate login ID for your tenant. This feature tells the Azure AD login servers to not only check the sign-in identifier against UPN values, but also against *ProxyAddresses* values for the email address.
158158

159-
During preview, you can currently only enable email as an alternate login ID using PowerShell or the Microsoft Graph API. You need *global administrator* privileges to complete the following steps:
159+
During preview, you can currently only enable email as an alternate login ID using PowerShell or the Microsoft Graph API. You need *Global Administrator* privileges to complete the following steps:
160160

161161
1. Open a PowerShell session as an administrator, then install the *Microsoft.Graph* module using the `Install-Module` cmdlet:
162162

@@ -274,7 +274,7 @@ Remove-MgPolicyHomeRealmDiscoveryPolicy -HomeRealmDiscoveryPolicyId "HRD_POLICY_
274274
Staged rollout policy allows tenant administrators to enable features for specific Azure AD groups. It is recommended that tenant administrators use staged rollout to test user sign-in with an email address. When administrators are ready to deploy this feature to their entire tenant, they should use [HRD policy](#enable-user-sign-in-with-an-email-address).
275275

276276

277-
You need *global administrator* permissions to complete the following steps:
277+
You need *Global Administrator* permissions to complete the following steps:
278278

279279
1. Open a PowerShell session as an administrator, then install the *AzureADPreview* module using the [Install-Module][Install-Module] cmdlet:
280280

@@ -284,7 +284,7 @@ You need *global administrator* permissions to complete the following steps:
284284
285285
If prompted, select **Y** to install NuGet or to install from an untrusted repository.
286286
287-
1. Sign in to your Azure AD tenant as a *global administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
287+
1. Sign in to your Azure AD tenant as a *Global Administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
288288
289289
```powershell
290290
Connect-AzureAD
@@ -379,7 +379,7 @@ Within a tenant, a cloud-only user's UPN may take on the same value as another u
379379
380380
If prompted, select **Y** to install NuGet or to install from an untrusted repository.
381381
382-
1. Sign in to your Azure AD tenant as a *global administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
382+
1. Sign in to your Azure AD tenant as a *Global Administrator* using the [Connect-AzureAD][Connect-AzureAD] cmdlet:
383383
384384
```powershell
385385
Connect-AzureAD
Lines changed: 87 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,87 @@
1+
---
2+
title: Data protection considerations
3+
description: Learn how services store and retrieve Azure AD object data through an RBAC authorization layer.
4+
services: active-directory
5+
author: janicericketts
6+
manager: martinco
7+
ms.service: active-directory
8+
ms.workload: identity
9+
ms.subservice: fundamentals
10+
ms.topic: conceptual
11+
ms.date: 01/19/2023
12+
ms.author: jricketts
13+
ms.reviewer: jricketts
14+
ms.custom: "it-pro"
15+
ms.collection:
16+
---
17+
18+
# Data protection considerations
19+
20+
The following diagram illustrates how services store and retrieve Azure Active Directory (Azure AD) object data through a role-based access control (RBAC) authorization layer. This layer calls the internal directory data access layer, ensuring the user's data request is permitted:
21+
22+
![Diagram of services storing and retrieving Azure AD object data.](./media/data-protection-considerations/isolated-tenants.PNG)
23+
24+
**Azure AD Internal Interfaces Access**: Service-to-service communication with other Microsoft services, such as Microsoft 365 use Azure AD interfaces, which authorize the service's callers using client certificates.
25+
26+
**Azure AD External Interfaces Access**: Azure AD external interface helps prevent data leakage by using RBAC. When a security principal, such as a user, makes an access request to read information through Azure AD interfaces, a security token must accompany the request. The token contains claims about the principal making the request.
27+
28+
The security tokens are issued by the Azure AD Authentication Services. Information about the user’s existence, enabled state, and role is used by the authorization system to decide whether the requested access to the target tenant is authorized for this user in this session.
29+
30+
**Application Access**: Because applications can access the Application Programming Interfaces (APIs) without user context, the access check includes information about the user’s application and the scope of access requested, for example read only, read/write, etc. Many applications use OpenID Connect or OAuth to obtain tokens to access the directory on behalf of the user. These applications must be explicitly granted access to the directory or they won't receive a token from Azure AD Authentication Service, and they access data from the granted scope.
31+
32+
**Auditing**: Access is audited. For example, authorized actions such as create user and password reset create an audit trail that can be used by a tenant administrator to manage compliance efforts or investigations. Tenant administrators can generate audit reports by using the Azure AD audit API.
33+
34+
Learn more: [Audit logs in Azure Active Directory](../reports-monitoring/concept-audit-logs.md)
35+
36+
**Tenant Isolation**: Enforcement of security in Azure AD multi-tenant environment helps achieve two primary goals:
37+
38+
* Prevent data leakage and access across tenants: Data belonging to Tenant 1 can't be obtained by users in Tenant 2 without explicit authorization by Tenant 1.
39+
* Resource access isolation across tenants: Operations performed by Tenant 1 can't affect access to resources for Tenant 2.
40+
41+
## Tenant isolation
42+
43+
The following information outlines tenant isolation.
44+
45+
* The service secures tenants using RBAC policy to ensure data isolation.
46+
* To enable access to a tenant, a principal, for example a user or application, needs to be able to authenticate against Azure AD to obtain context and has explicit permissions defined in the tenant. If a principal isn't authorized in the tenant, the resulting token won't carry permissions, and the RBAC system rejects requests in this context.
47+
* RBAC ensures access to a tenant is performed by a security principal authorized in the tenant. Access across tenants is possible when a tenant administrator creates a security principal representation in the same tenant (for example, provisioning a guest user account using B2B collaboration), or when a tenant administrator creates a policy to enable a trust relationship with another tenant. For example, a cross-tenant access policy to enable B2B Direct Connect. Each tenant is an isolation boundary; existence in one tenant doesn't equate existence in another tenant unless the administrator allows it.
48+
* Azure AD data for multiple tenants is stored in the same physical server and drive for a given partition. Isolation is ensured because access to the data is protected by the RBAC authorization system.
49+
* A customer application can't access Azure AD without needed authentication. The request is rejected if not accompanied by credentials as part of the initial connection negotiation process. This dynamic prevents unauthorized access to a tenant by neighboring tenants. Only user credential’s token, or Security Assertion Markup Language (SAML) token, is brokered with a federated trust. Therefore, it's validated by Azure AD, based on the shared keys configured by the Azure AD tenant Global Administrator.
50+
* Because there's no application component that can execute from the Core Store, it's not possible for one tenant to forcibly breach the integrity of a neighboring tenant.
51+
52+
## Data security
53+
54+
**Encryption in Transit**: To assure data security, directory data in Azure AD is signed and encrypted while in transit between data centers in a scale unit. The data is encrypted and unencrypted by the Azure AD Core Store tier, which resides in secured server hosting areas of the associated Microsoft data centers.
55+
56+
Customer-facing web services are secured with the Transport Layer Security (TLS) protocol.
57+
58+
**Secret Storage**: Azure AD Service back-end uses encryption to store sensitive material for service use, such as certificates, keys, credentials, and hashes using Microsoft proprietary technology. The store used depends on the service, the operation, the scope of the secret (user-wide or tenant-wide), and other requirements.
59+
60+
These stores are operated by a security-focused group via established automation and workflows, including certificate request, renewal, revocation, and destruction.
61+
62+
There's activity auditing related to these stores/workflows/processes, and there is no standing access. Access is request- and approval-based, and for a limited amount of time.
63+
64+
For more information about Secret encryption at rest, see the following table.
65+
66+
**Algorithms**: The following table lists the minimum cryptography algorithms used by Azure AD components. As a cloud service, Microsoft reassesses and improves the cryptography, based on security research findings, internal security reviews, key strength against hardware evolution, etc.
67+
68+
|Data/scenario|Cryptography algorithm|
69+
|---|---|
70+
|Password hash sync</br>Cloud account passwords|Hash: Password Key Derivation Function 2 (PBKDF2), using HMAC-SHA256 @ 1000 iterations |
71+
|Directory in transit between data centers|AES-256-CTS-HMAC-SHA1-96</br>TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 |
72+
|Pass-through authentication user credential flow|RSA 2048-Public/Private key pair </br> Learn more: [Azure Active Directory Pass-through Authentication security deep dive](../hybrid/how-to-connect-pta-security-deep-dive.md)|
73+
|Self-service password reset password writeback with Azure AD Connect: Cloud to on-premises communication |RSA 2048 Private/Public key pair</br>AES_GCM (256-bits key, 96-bits IV size)|
74+
|Self-service password reset: Answers to security questions|SHA256|
75+
|SSL certificates for Azure AD application</br>Proxy published applications |AES-GCM 256-bit |
76+
|Disk-level encryption|XTS-AES 128|
77+
|[Seamless single sign-on (SSO)](../../active-directory/hybrid/how-to-connect-sso-how-it-works.md) service account password</br>SaaS application provisioning credentials|AES-CBC 128-bit |
78+
|Azure AD Managed Identities|AES-GCM 256-bit|
79+
|Microsoft Authenticator app: Passwordless sign-in to Azure AD |Asymmetric RSA Key 2048-bit|
80+
|Microsoft Authenticator app: Backup and restore of enterprise account metadata |AES-256 |
81+
82+
## Resources
83+
* [Azure AD and data residency](azure-ad-data-residency.md)
84+
* [Microsoft Service Trust Documents](https://servicetrust.microsoft.com/Documents/TrustDocuments)
85+
* [Microsoft Azure Trust Center](https://azure.microsoft.com/overview/trusted-cloud/)
86+
* [Where is my data? - Office 365 documentation](http://o365datacentermap.azurewebsites.net/)
87+
* [Recover from deletions in Azure Active Directory](recover-from-deletions.md)

articles/active-directory/fundamentals/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,8 @@ items:
9898
items:
9999
- name: Azure AD and data residency
100100
href: azure-ad-data-residency.md
101+
- name: Data protection considerations
102+
href: data-protection-considerations.md
101103
- name: Customer data storage and processing for Europe
102104
href: active-directory-data-storage-eu.md
103105
- name: Customer data storage for Australia and New Zealand

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3895,7 +3895,7 @@ Risk-based Conditional Access and risk detection features of Identity Protection
38953895

38963896
In October 2020 we have added following 27 new applications in our App gallery with Federation support:
38973897

3898-
[Sentry](../saas-apps/sentry-tutorial.md), [Bumblebee - Productivity Superapp](https://app.yellowmessenger.com/user/login), [ABBYY FlexiCapture Cloud](../saas-apps/abbyy-flexicapture-cloud-tutorial.md), [EAComposer](../saas-apps/eacomposer-tutorial.md), [Genesys Cloud Integration for Azure](https://apps.mypurecloud.com/msteams-integration/), [Zone Technologies Portal](https://portail.zonetechnologie.com/signin), [Beautiful.ai](../saas-apps/beautiful.ai-tutorial.md), [Datawiza Access Broker](https://console.datawiza.com/), [ZOKRI](https://app.zokri.com/), [CheckProof](../saas-apps/checkproof-tutorial.md), [Ecochallenge.org](https://events.ecochallenge.org/users/login), [atSpoke](http://atspoke.com/login), [Appointment Reminder](https://app.appointmentreminder.co.nz/account/login), [Cloud.Market](https://cloud.market/), [TravelPerk](../saas-apps/travelperk-tutorial.md), [Greetly](https://app.greetly.com/), [OrgVitality SSO](../saas-apps/orgvitality-sso-tutorial.md), [Web Cargo Air](../saas-apps/web-cargo-air-tutorial.md), [Loop Flow CRM](../saas-apps/loop-flow-crm-tutorial.md), [Starmind](../saas-apps/starmind-tutorial.md), [Workstem](https://hrm.workstem.com/login), [Retail Zipline](../saas-apps/retail-zipline-tutorial.md), [Hoxhunt](../saas-apps/hoxhunt-tutorial.md), [MEVISIO](../saas-apps/mevisio-tutorial.md), [Samsara](../saas-apps/samsara-tutorial.md), [Nimbus](../saas-apps/nimbus-tutorial.md), [Pulse Secure virtual Traffic Manager](../saas-apps/pulse-secure-virtual-traffic-manager-tutorial.md)
3898+
[Sentry](../saas-apps/sentry-tutorial.md), [Bumblebee - Productivity Superapp](https://app.yellowmessenger.com/user/login), [ABBYY FlexiCapture Cloud](../saas-apps/abbyy-flexicapture-cloud-tutorial.md), [EAComposer](../saas-apps/eacomposer-tutorial.md), [Genesys Cloud Integration for Azure](https://apps.mypurecloud.com/msteams-integration/), [Zone Technologies Portal](https://portail.zonetechnologie.com/signin), [Beautiful.ai](../saas-apps/beautiful.ai-tutorial.md), [Datawiza Access Broker](https://console.datawiza.com/), [ZOKRI](https://app.zokri.com/), [CheckProof](../saas-apps/checkproof-tutorial.md), [Ecochallenge.org](https://events.ecochallenge.org/users/login), [atSpoke](https://www.atspoke.com/), [Appointment Reminder](https://app.appointmentreminder.co.nz/account/login), [Cloud.Market](https://cloud.market/), [TravelPerk](../saas-apps/travelperk-tutorial.md), [Greetly](https://app.greetly.com/), [OrgVitality SSO](../saas-apps/orgvitality-sso-tutorial.md), [Web Cargo Air](../saas-apps/web-cargo-air-tutorial.md), [Loop Flow CRM](../saas-apps/loop-flow-crm-tutorial.md), [Starmind](../saas-apps/starmind-tutorial.md), [Workstem](https://hrm.workstem.com/login), [Retail Zipline](../saas-apps/retail-zipline-tutorial.md), [Hoxhunt](../saas-apps/hoxhunt-tutorial.md), [MEVISIO](../saas-apps/mevisio-tutorial.md), [Samsara](../saas-apps/samsara-tutorial.md), [Nimbus](../saas-apps/nimbus-tutorial.md), [Pulse Secure virtual Traffic Manager](../saas-apps/pulse-secure-virtual-traffic-manager-tutorial.md)
38993899

39003900
You can also find the documentation of all the applications from here https://aka.ms/AppsTutorial
39013901

0 commit comments

Comments
 (0)