You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/use-scim-to-build-users-and-groups-endpoints.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,7 +99,7 @@ The default token validation code is configured to use an Azure AD token and req
99
99
100
100
After you deploy the SCIM endpoint, you can test to ensure that it's compliant with SCIM RFC. This example provides a set of tests in Postman that validate CRUD (create, read, update, and delete) operations on users and groups, filtering, updates to group membership, and disabling users.
101
101
102
-
The endpoints are in the `{host}/scim/` directory, and you can use standard HTTP requests to interact with them. To modify the `/scim/` route, see *TokenController.cs* in **SCIMReferenceCode** > **Microsoft.SCIM.WebHostSample** > **Controllers**.
102
+
The endpoints are in the `{host}/scim/` directory, and you can use standard HTTP requests to interact with them. To modify the `/scim/` route, see *ControllerConstant.cs* in **AzureADProvisioningSCIMreference** > **ScimReferenceApi** > **Controllers**.
103
103
104
104
> [!NOTE]
105
105
> You can only use HTTP endpoints for local tests. The Azure AD provisioning service requires that your endpoint support HTTPS.
@@ -141,4 +141,4 @@ To develop a SCIM-compliant user and group endpoint with interoperability for a
141
141
142
142
> [!div class="nextstepaction"]
143
143
> [Tutorial: Develop and plan provisioning for a SCIM endpoint](use-scim-to-provision-users-and-groups.md)
144
-
> [Tutorial: Configure provisioning for a gallery app](configure-automatic-user-provisioning-portal.md)
144
+
> [Tutorial: Configure provisioning for a gallery app](configure-automatic-user-provisioning-portal.md)
Copy file name to clipboardExpand all lines: articles/active-directory/app-proxy/application-proxy-high-availability-load-balancing.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ Connectors establish their connections based on principles for high availability
28
28

29
29
30
30
1. A user on a client device tries to access an on-premises application published through Application Proxy.
31
-
2. The request goes through an Azure Load Balancer to determine which Application Proxy service instance should take the request. Per region, there are tens of instances available to accept the request. This method helps to evenly distribute the traffic across the service instances.
31
+
2. The request goes through an Azure Load Balancer to determine which Application Proxy service instance should take the request. There are tens of instances available to accept the requests for all traffic in the region. This method helps to evenly distribute the traffic across the service instances.
32
32
3. The request is sent to [Service Bus](../../service-bus-messaging/index.yml).
33
33
4. Service Bus signals to an available connector. The connector then picks up the request from Service Bus.
34
34
- In step 2, requests go to different Application Proxy service instances, so connections are more likely to be made with different connectors. As a result, connectors are almost evenly used within the group.
@@ -89,4 +89,4 @@ Refer to your software vendor's documentation to understand the load-balancing r
To give your users easy access to your cloud apps, Azure Active Directory (Azure AD) supports a broad variety of authentication protocols including legacy authentication. However, legacy authentication doesn't support multifactor authentication (MFA). MFA is in many environments a common requirement to address identity theft.
17
17
18
18
> [!NOTE]
19
-
> Effective October 1, 2022, we will begin to permanently disable Basic Authentication for Exchange Online in all Microsoft 365 tenants regardless of usage, except for SMTP Authentication.
19
+
> Effective October 1, 2022, we will begin to permanently disable Basic Authentication for Exchange Online in all Microsoft 365 tenants regardless of usage, except for SMTP Authentication. Read more [here](/exchange/clients-and-mobile-in-exchange-online/deprecation-of-basic-authentication-exchange-online)
20
20
21
21
Alex Weinert, Director of Identity Security at Microsoft, in his March 12, 2020 blog post [New tools to block legacy authentication in your organization](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/new-tools-to-block-legacy-authentication-in-your-organization/ba-p/1225302#) emphasizes why organizations should block legacy authentication and what other tools Microsoft provides to accomplish this task:
If you do find yourself locked out[What to do if you are locked out of the Azure portal?](troubleshoot-conditional-access.md#what-to-do-if-you-are-locked-out-of-the-azure-portal)
77
+
If you do find yourself locked out[What to do if you are locked out of the Azure portal?](troubleshoot-conditional-access.md#what-to-do-if-youre-locked-out-of-the-azure-portal)
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/terms-of-use.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -355,7 +355,7 @@ Conditional Access policies take effect immediately. When this happens, the admi
355
355
356
356
## B2B guests
357
357
358
-
Most organizations have a process in place for their employees to consent to their organization's terms of use policy and privacy statements. But how can you enforce the same consents for Azure AD business-to-business (B2B) guests when they're added via SharePoint or Teams? Using Conditional Access and terms of use policies, you can enforce a policy directly towards B2B guest users. During the invitation redemption flow, the user is presented with the terms of use policy. This support is currently in preview.
358
+
Most organizations have a process in place for their employees to consent to their organization's terms of use policy and privacy statements. But how can you enforce the same consents for Azure AD business-to-business (B2B) guests when they're added via SharePoint or Teams? Using Conditional Access and terms of use policies, you can enforce a policy directly towards B2B guest users. During the invitation redemption flow, the user is presented with the terms of use policy.
359
359
360
360
Terms of use policies will only be displayed when the user has a guest account in Azure AD. SharePoint Online currently has an [ad hoc external sharing recipient experience](/sharepoint/what-s-new-in-sharing-in-targeted-release) to share a document or a folder that doesn't require the user to have a guest account. In this case, a terms of use policy isn't displayed.
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/troubleshoot-conditional-access.md
+10-12Lines changed: 10 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,12 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: troubleshooting
9
-
ms.date: 10/16/2020
9
+
ms.date: 03/15/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
13
13
manager: karenhoran
14
-
ms.reviewer: calebb, martinco
14
+
ms.reviewer: calebb
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
@@ -28,9 +28,9 @@ Organizations should avoid the following configurations:
28
28
**For all users, all cloud apps:**
29
29
30
30
-**Block access** - This configuration blocks your entire organization.
31
-
-**Require device to be marked as compliant** - For users that have not enrolled their devices yet, this policy blocks all access including access to the Intune portal. If you are an administrator without an enrolled device, this policy blocks you from getting back into the Azure portal to change the policy.
31
+
-**Require device to be marked as compliant** - For users that haven't enrolled their devices yet, this policy blocks all access including access to the Intune portal. If you're an administrator without an enrolled device, this policy blocks you from getting back into the Azure portal to change the policy.
32
32
-**Require Hybrid Azure AD domain joined device** - This policy block access has also the potential to block access for all users in your organization if they don't have a hybrid Azure AD joined device.
33
-
-**Require app protection policy** - This policy block access has also the potential to block access for all users in your organization if you don't have an Intune policy. If you are an administrator without a client application that has an Intune app protection policy, this policy blocks you from getting back into portals such as Intune and Azure.
33
+
-**Require app protection policy** - This policy block access has also the potential to block access for all users in your organization if you don't have an Intune policy. If you're an administrator without a client application that has an Intune app protection policy, this policy blocks you from getting back into portals such as Intune and Azure.
34
34
35
35
**For all users, all cloud apps, all device platforms:**
36
36
@@ -42,7 +42,7 @@ The first way is to review the error message that appears. For problems signing
42
42
43
43

44
44
45
-
In the above error, the message states that the application can only be accessed from devices or client applications that meet the company's mobile device management policy. In this case, the application and device do not meet that policy.
45
+
In the above error, the message states that the application can only be accessed from devices or client applications that meet the company's mobile device management policy. In this case, the application and device don't meet that policy.
46
46
47
47
## Azure AD sign-in events
48
48
@@ -66,7 +66,7 @@ To find out which Conditional Access policy or policies applied and why do the f
66
66

67
67
68
68
1. Once the sign-in event that corresponds to the user's sign-in failure has been found select the **Conditional Access** tab. The Conditional Access tab will show the specific policy or policies that resulted in the sign-in interruption.
69
-
1. Information in the **Troubleshooting and support** tab may provide a clear reason as to why a sign-in failed such as a device that did not meet compliance requirements.
69
+
1. Information in the **Troubleshooting and support** tab may provide a clear reason as to why a sign-in failed such as a device that didn't meet compliance requirements.
70
70
1. To investigate further, drill down into the configuration of the policies by clicking on the **Policy Name**. Clicking the **Policy Name** will show the policy configuration user interface for the selected policy for review and editing.
71
71
1. The **client user** and **device details** that were used for the Conditional Access policy assessment are also available in the **Basic Info**, **Location**, **Device Info**, **Authentication Details**, and **Additional Details** tabs of the sign-in event.
72
72
@@ -80,11 +80,9 @@ Selecting the ellipsis on the right side of the policy in a sign-in event brings
80
80
81
81
The left side provides details collected at sign-in and the right side provides details of whether those details satisfy the requirements of the applied Conditional Access policies. Conditional Access policies only apply when all conditions are satisfied or not configured.
82
82
83
-
If the information in the event isn't enough to understand the sign-in results or adjust the policy to get desired results, then a support incident may be opened. Navigate to that sign-in event's **Troubleshooting and support**tab and select **Create a new support request**.
83
+
If the information in the event isn't enough to understand the sign-in results or adjust the policy to get desired results, the sign-in diagnostic tool can be used. The sign-in diagnostic can be found under **Basic info**> **Troubleshoot Event**. For more information about the sign-in diagnostic, see the article [What is the sign-in diagnostic in Azure AD](../reports-monitoring/overview-sign-in-diagnostics.md).
84
84
85
-

86
-
87
-
When submitting the incident, provide the request ID and time and date from the sign-in event in the incident submission details. This information will allow Microsoft support to find the event you're concerned about.
85
+
If you need to submit a support incident, provide the request ID and time and date from the sign-in event in the incident submission details. This information will allow Microsoft support to find the specific event you're concerned about.
88
86
89
87
### Conditional Access error codes
90
88
@@ -96,9 +94,9 @@ When submitting the incident, provide the request ID and time and date from the
96
94
| 53003 | BlockedByConditionalAccess |
97
95
| 53004 | ProofUpBlockedDueToRisk |
98
96
99
-
## What to do if you are locked out of the Azure portal?
97
+
## What to do if you're locked out of the Azure portal?
100
98
101
-
If you are locked out of the Azure portal due to an incorrect setting in a Conditional Access policy:
99
+
If you're locked out of the Azure portal due to an incorrect setting in a Conditional Access policy:
102
100
103
101
- Check is there are other administrators in your organization that aren't blocked yet. An administrator with access to the Azure portal can disable the policy that is impacting your sign-in.
104
102
- If none of the administrators in your organization can update the policy, submit a support request. Microsoft support can review and upon confirmation update the Conditional Access policies that are preventing access.
title: 'Disable PTA when using Azure AD Connect "Do not configure" | Microsoft Docs'
3
-
description: This article describes how to disable PTA with the Azure AD Connect "do not configure" feature.
2
+
title: 'Disable pass-through authentication by using Azure AD Connect or PowerShell | Microsoft Docs'
3
+
description: This article describes how to disable pass-through authentication by using the Azure AD Connect Do Not Configure feature or by using PowerShell.
4
4
services: active-directory
5
5
author: billmath
6
6
manager: karenhoran
@@ -13,52 +13,47 @@ ms.author: billmath
13
13
ms.collection: M365-identity-device-management
14
14
---
15
15
16
-
# Disable PTA
16
+
# Disable pass-through authentication
17
17
18
-
To disable PTA, complete the steps that are described in [Disable PTA when using Azure AD Connect](#disable-pta-when-using-azure-ad-connect) and [Disable PTA in PowerShell](#disable-pta-in-powershell) in this article.
18
+
In this article, you learn how to disable pass-through authentication by using Azure Active Directory (Azure AD) Connect or PowerShell.
19
19
20
-
## Disable PTA when using Azure AD Connect
20
+
## Prerequisites
21
21
22
-
If you are using Pass-through Authentication with Azure AD Connect and you have it set to **"Do not configure"**, you can disable it.
22
+
Before you begin, ensure that you have the following:
23
23
24
-
>[!NOTE]
25
-
>If you have PHS already enabled then disabling PTA will result in the tenant fallback to PHS.
24
+
- A Windows machine with pass-through authentication agent version 1.5.1742.0 or later installed. Any earlier version might not have the requisite cmdlets for completing this operation.
26
25
27
-
Disabling PTA can be done using the following cmdlets.
26
+
If you don't already have an agent, you can install it by doing the following:
28
27
29
-
## Prerequisites
30
-
The following prerequisites are required:
31
-
- Any Windows machine that has the PTA agent installed.
32
-
- Agent must be at version 1.5.1742.0 or later.
33
-
- An Azure global administrator account in order to run the PowerShell cmdlets to disable PTA.
28
+
1. Go to the [Azure portal](https://portal.azure.com).
29
+
1. Download the latest Auth Agent.
30
+
1. Install the feature by running either of the following:
> If you're using the Azure Government cloud, pass in the ENVIRONMENTNAME parameter with the following value:
35
+
>
36
+
>| Environment Name | Cloud |
37
+
>| - | - |
38
+
>| AzureUSGovernment | US Gov |
34
39
35
-
>[!NOTE]
36
-
> If your agent is older then it may not have the cmdlets required to complete this operation. You can get a new agent from Azure Portal an install it on any Windows machine and provide admin credentials. (Installing the agent does not affect the PTA status in the cloud)
40
+
- An Azure global administrator account for running the PowerShell cmdlets.
41
+
42
+
## Use Azure AD Connect
37
43
38
-
> [!IMPORTANT]
39
-
> If you are using the Azure Government cloud then you will have to pass in the ENVIRONMENTNAME parameter with the following value.
40
-
>
41
-
>| Environment Name | Cloud |
42
-
>| - | - |
43
-
>| AzureUSGovernment | US Gov|
44
+
If you're using pass-through authentication with Azure AD Connect and you have it set to **Do not configure**, you can disable the setting.
44
45
46
+
>[!NOTE]
47
+
>If you already have password hash synchronization enabled, disabling pass-through authentication will result in a tenant fallback to password hash synchronization.
45
48
46
-
## Disable PTA in PowerShell
49
+
## Use PowerShell
47
50
48
-
From within a PowerShell session, use the following to disable PTA:
51
+
In a PowerShell session, run the following cmdlets:
0 commit comments