Skip to content

Commit 340a513

Browse files
authored
Merge pull request #192506 from Justinha/table
small edits
2 parents 245a2c1 + 5497ff6 commit 340a513

File tree

3 files changed

+13
-21
lines changed

3 files changed

+13
-21
lines changed

articles/active-directory/authentication/feature-availability.md

Lines changed: 9 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/28/2022
9+
ms.date: 03/22/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -25,59 +25,51 @@ This following tables list Azure AD feature availability in Azure Government.
2525

2626
|Service | Feature | Availability |
2727
|:------|---------|:------------:|
28-
|**Authentication, single sign-on, and MFA**|||
29-
||Cloud authentication (Pass-through authentication, password hash synchronization) | ✅ |
28+
|**Authentication, single sign-on, and MFA**|Cloud authentication (Pass-through authentication, password hash synchronization) | ✅ |
3029
|| Federated authentication (Active Directory Federation Services or federation with other identity providers) | ✅ |
3130
|| Single sign-on (SSO) unlimited | ✅ |
3231
|| Multifactor authentication (MFA) | Hardware OATH tokens are not available. Instead, use Conditional Access policies with named locations to establish when multifactor authentication should and should not be required based off the user's current IP address. Microsoft Authenticator only shows GUID and not UPN for compliance reasons. |
3332
|| Passwordless (Windows Hello for Business, Microsoft Authenticator, FIDO2 security key integrations) | ✅ |
3433
|| Service-level agreement | ✅ |
35-
|**Applications access**|||
36-
|| SaaS apps with modern authentication (Azure AD application gallery apps, SAML, and OAUTH 2.0) | ✅ |
34+
|**Applications access**|SaaS apps with modern authentication (Azure AD application gallery apps, SAML, and OAUTH 2.0) | ✅ |
3735
|| Group assignment to applications | ✅ |
3836
|| Cloud app discovery (Microsoft Cloud App Security) | ✅ |
3937
|| Application Proxy for on-premises, header-based, and Integrated Windows Authentication | ✅ |
4038
|| Secure hybrid access partnerships (Kerberos, NTLM, LDAP, RDP, and SSH authentication) | ✅ |
41-
|**Authorization and Conditional Access**|||
42-
|| Role-based access control (RBAC) | ✅ |
39+
|**Authorization and Conditional Access**|Role-based access control (RBAC) | ✅ |
4340
|| Conditional Access | ✅ |
4441
|| SharePoint limited access | ✅ |
4542
|| Session lifetime management | ✅ |
4643
|| Identity Protection (vulnerabilities and risky accounts) | See [Identity protection](#identity-protection) below. |
4744
|| Identity Protection (risk events investigation, SIEM connectivity) | See [Identity protection](#identity-protection) below. |
48-
|**Administration and hybrid identity**|||
49-
|| User and group management | ✅ |
45+
|**Administration and hybrid identity**|User and group management | ✅ |
5046
|| Advanced group management (Dynamic groups, naming policies, expiration, default classification) | ✅ |
5147
|| Directory synchronization—Azure AD Connect (sync and cloud sync) | ✅ |
5248
|| Azure AD Connect Health reporting | ✅ |
5349
|| Delegated administration—built-in roles | ✅ |
5450
|| Global password protection and management – cloud-only users | ✅ |
5551
|| Global password protection and management – custom banned passwords, users synchronized from on-premises Active Directory | ✅ |
5652
|| Microsoft Identity Manager user client access license (CAL) | ✅ |
57-
|**End-user self-service**|||
58-
|| Application launch portal (My Apps) | ✅ |
53+
|**End-user self-service**|Application launch portal (My Apps) | ✅ |
5954
|| User application collections in My Apps | ✅ |
6055
|| Self-service account management portal (My Account) | ✅ |
6156
|| Self-service password change for cloud users | ✅ |
6257
|| Self-service password reset/change/unlock with on-premises write-back | ✅ |
6358
|| Self-service sign-in activity search and reporting | ✅ |
6459
|| Self-service group management (My Groups) | ✅ |
6560
|| Self-service entitlement management (My Access) | ✅ |
66-
|**Identity governance**|||
67-
|| Automated user provisioning to apps | ✅ |
61+
|**Identity governance**|Automated user provisioning to apps | ✅ |
6862
|| Automated group provisioning to apps | ✅ |
6963
|| HR-driven provisioning | Partial. See [HR-provisioning apps](#hr-provisioning-apps). |
7064
|| Terms of use attestation | ✅ |
7165
|| Access certifications and reviews | ✅ |
7266
|| Entitlement management | ✅ |
7367
|| Privileged Identity Management (PIM), just-in-time access | ✅ |
74-
|**Event logging and reporting**|||
75-
|| Basic security and usage reports | ✅ |
68+
|**Event logging and reporting**|Basic security and usage reports | ✅ |
7669
|| Advanced security and usage reports | ✅ |
7770
|| Identity Protection: vulnerabilities and risky accounts | ✅ |
7871
|| Identity Protection: risk events investigation, SIEM connectivity | ✅ |
79-
|**Frontline workers**|||
80-
|| SMS sign-in | Feature not available. |
72+
|**Frontline workers**|SMS sign-in | Feature not available. |
8173
|| Shared device sign-out | Enterprise state roaming for Windows 10 devices is not available. |
8274
|| Delegated user management portal (My Staff) | Feature not available. |
8375

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/28/2022
9+
ms.date: 03/22/2022
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -101,7 +101,7 @@ The following table lists **authenticationMethodsRegistrationCampaign** properti
101101
| Name | Possible values | Description |
102102
|------|-----------------|-------------|
103103
| state | "enabled"<br>"disabled"<br>"default" | Allows you to enable or disable the feature.<br>Default value is used when the configuration hasn't been explicitly set and will use Azure AD default value for this setting. Currently maps to disabled.<br>Change states to either enabled or disabled as needed. |
104-
| snoozeDurationInDays | Range: 0 – 14 | Defines after how many days the user will see the nudge again.<br>If the value is 0, the user is nudged during every MFA attempt.<br>Default: 1 day |
104+
| snoozeDurationInDays | Range: 0 – 14 | Defines the number of days before the user is nudged again.<br>If the value is 0, the user is nudged during every MFA attempt.<br>Default: 1 day |
105105
| includeTargets | N/A | Allows you to include different users and groups that you want the feature to target. |
106106
| excludeTargets | N/A | Allows you to exclude different users and groups that you want omitted from the feature. If a user is in a group that is excluded and a group that is included, the user will be excluded from the feature.|
107107

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/11/2022
9+
ms.date: 03/22/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -24,7 +24,7 @@ The following Azure AD Multi-Factor Authentication settings are available in the
2424

2525
| Feature | Description |
2626
| ------- | ----------- |
27-
| [Account lockout](#account-lockout) | Temporarily lock accounts from using Azure AD Multi-Factor Authentication if there are too many denied authentication attempts in a row. This feature applies only to users who enter a PIN to authenticate. (MFA Server) |
27+
| [Account lockout](#account-lockout) | Temporarily lock accounts from using Azure AD Multi-Factor Authentication if there are too many denied authentication attempts in a row. This feature applies only to users who enter a PIN to authenticate. (MFA Server only) |
2828
| [Block/unblock users](#block-and-unblock-users) | Block specific users from being able to receive Azure AD Multi-Factor Authentication requests. Any authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they're blocked or until they're manually unblocked. |
2929
| [Fraud alert](#fraud-alert) | Configure settings that allow users to report fraudulent verification requests. |
3030
| [Notifications](#notifications) | Enable notifications of events from MFA Server. |

0 commit comments

Comments
 (0)