Skip to content

Commit 3668a03

Browse files
authored
Merge pull request #251307 from MicrosoftDocs/main
9/13/2023 AM Publish
2 parents c96b0ee + 8753635 commit 3668a03

File tree

309 files changed

+1354
-1426
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

309 files changed

+1354
-1426
lines changed

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 09/06/2023
4+
ms.date: 09/13/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/inbound-provisioning-api-issues.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,13 @@ This document covers commonly encountered errors and issues with inbound provisi
4040

4141
**Probable causes**
4242
1. Your API-driven provisioning app is paused.
43-
1. The provisioning service is yet to update the provisioning logs with the bulk request processing details.
43+
1. The provisioning service is yet to update the provisioning logs with the bulk request processing details.
44+
2. Your On-premises provisioning agent status is inactive (If you are running the [/API-driven inbound user provisioning to on-premises Active Directory](https://go.microsoft.com/fwlink/?linkid=2245182)).
45+
4446

4547
**Resolution:**
4648
1. Verify that your provisioning app is running. If it isn't running, select the menu option **Start provisioning** to process the data.
49+
2. Turn your On-premises provisioning agent status to active by restarting the On-premise agent.
4750
1. Expect 5 to 10-minute delay between processing the request and writing to the provisioning logs. If your API client is sending data to the provisioning /bulkUpload API endpoint, then introduce a time delay between the request invocation and provisioning logs query.
4851

4952
### Forbidden 403 response code

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -79,17 +79,17 @@ Azure AD CBA is an MFA (Multi factor authentication) capable method, that is Azu
7979
If CBA enabled user only has a Single Factor (SF) certificate and need MFA
8080
1. Use Password + SF certificate.
8181
1. Issue Temporary Access Pass (TAP)
82-
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
82+
1. Admin adds Phone Number to user account and allows Voice/text message method for user.
8383

8484
If CBA enabled user has not yet been issued a certificate and need MFA
8585
1. Issue Temporary Access Pass (TAP)
86-
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
86+
1. Admin adds Phone Number to user account and allows Voice/text message method for user.
8787

8888
If CBA enabled user cannot use MF cert (such as on mobile device without smart card support) and need MFA
8989
1. Issue Temporary Access Pass (TAP)
9090
1. User Register another MFA method (when user can use MF cert)
9191
1. Use Password + MF cert (when user can use MF cert)
92-
1. Admin adds Phone Number to user account and allows Voice/SMS method for user
92+
1. Admin adds Phone Number to user account and allows Voice/text message method for user
9393

9494

9595
## MFA with Single-factor certificate-based authentication

articles/active-directory/authentication/concept-certificate-based-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The following images show how Azure AD CBA simplifies the customer environment b
5151
The following scenarios are supported:
5252

5353
- User sign-ins to web browser-based applications on all platforms.
54-
- User sign-ins to Office mobile apps, including Outlook, OneDrive, and so on.
54+
- User sign-ins to Office mobile apps on iOS/Android platforms as well as Office native apps in Windows, including Outlook, OneDrive, and so on.
5555
- User sign-ins on mobile native browsers.
5656
- Support for granular authentication rules for multifactor authentication by using the certificate issuer **Subject** and **policy OIDs**.
5757
- Configuring certificate-to-user account bindings by using any of the certificate fields:

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The following table provides a list of the features that are available in the va
4444
| Protect Azure AD tenant admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) ||||
4545
| Mobile app as a second factor ||||||
4646
| Phone call as a second factor | | ||||
47-
| SMS as a second factor | |||||
47+
| Text message as a second factor | |||||
4848
| Admin control over verification methods | |||||
4949
| Fraud alert | | | |||
5050
| MFA Reports | | | |||
@@ -70,7 +70,7 @@ Our recommended approach to enforce MFA is using [Conditional Access](../conditi
7070
| Configuration flexibility | || |
7171
| **Functionality** |
7272
| Exempt users from the policy | |||
73-
| Authenticate by phone call or SMS ||||
73+
| Authenticate by phone call or text message ||||
7474
| Authenticate by Microsoft Authenticator and Software tokens ||||
7575
| Authenticate by FIDO2, Windows Hello for Business, and Hardware tokens | |||
7676
| Blocks legacy authentication protocols ||||

articles/active-directory/authentication/concept-mfa-regional-opt-in.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/11/2023
9+
ms.date: 09/12/2023
1010

1111
author: aloom3
1212
ms.author: justinha
@@ -24,12 +24,12 @@ As a protection for our customers, Microsoft doesn't automatically support telep
2424

2525
In today's digital world, telecommunication services have become ingrained into our lives. But advancements come with a risk of fraudulent activities. International Revenue Share Fraud (IRSF) is a threat with severe financial implications that also makes using services more difficult. Let's look at IRSF fraud more in-depth.
2626

27-
IRSF is a type of telephony fraud where criminals exploit the billing system of telecommunication services providers to make profit for themselves. Bad actors gain unauthorized access to a telecommunication network and divert traffic to those networks to skim profit for every transaction that is sent to that network. To divert traffic, bad actors steal existing usernames and passwords, create new usernames and passwords, or try a host of other things to send SMS messages and voice calls through their telecommunication network. Bad actors take advantage of multifactor authentication screens, which require an SMS or voice call before a user can access their account. This activity causes exorbitant charges and makes services unreliable for our customers, causing downtime, and system errors.
27+
IRSF is a type of telephony fraud where criminals exploit the billing system of telecommunication services providers to make profit for themselves. Bad actors gain unauthorized access to a telecommunication network and divert traffic to those networks to skim profit for every transaction that is sent to that network. To divert traffic, bad actors steal existing usernames and passwords, create new usernames and passwords, or try a host of other things to send text message messages and voice calls through their telecommunication network. Bad actors take advantage of multifactor authentication screens, which require a text message or voice call before a user can access their account. This activity causes exorbitant charges and makes services unreliable for our customers, causing downtime, and system errors.
2828

2929
Here's how an IRSF attack may happen:
3030

3131
1. A bad actor first gets premium rate phone numbers and registers them.
32-
1. A bad actor uses automated scripts to request voice calls or SMS messages. The bad actor is colluding with number providers and the telecommunication network to drive more traffic to those services. The bad actor skims some of the profits of the increased traffic.
32+
1. A bad actor uses automated scripts to request voice calls or text messages. The bad actor is colluding with number providers and the telecommunication network to drive more traffic to those services. The bad actor skims some of the profits of the increased traffic.
3333
1. A bad actor will hop around different region codes to continue to drive traffic and make it hard for them to get caught.
3434

3535
The most common way to conduct IRSF is through an end-user experience that requires a two-factor authentication code. Bad actors add those premium rate phone numbers and pump traffic to them by requesting two-factor authentication codes. This activity results in revenue-skimming, and can lead to billions of dollars in loss.
@@ -46,7 +46,7 @@ For SMS verification, the following region codes require an opt-in.
4646
| 998 | Uzbek |
4747

4848
## Voice verification
49-
For Voice verification, the following region codes require an opt-in.
49+
For voice verification, the following region codes require an opt-in.
5050

5151
| Region Code | Region Name |
5252
|:----------- |:---------------------------------------------- |
26.6 KB
Loading
169 KB
Loading
35.5 KB
Loading
39.7 KB
Loading

0 commit comments

Comments
 (0)