Skip to content

Commit 36c5086

Browse files
authored
Merge pull request #76959 from MicrosoftDocs/master
5/16 OOB Publish
2 parents 6c69381 + f99d7b0 commit 36c5086

File tree

64 files changed

+1501
-140
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

64 files changed

+1501
-140
lines changed

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 36 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 03/18/2019
9+
ms.date: 05/1/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: daveba
14-
ms.reviewer: sahenry
14+
ms.reviewer: sahenry, calebb
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -48,6 +48,37 @@ If you have configured the Site to Zone Assignment List in Internet Explorer, th
4848
* [https://mysignins.microsoft.com](https://mysignins.microsoft.com)
4949
* [https://account.activedirectory.windowsazure.com](https://account.activedirectory.windowsazure.com)
5050

51+
## Conditional access policies for combined registration
52+
53+
Securing when and how users register for Azure Multi-Factor Authentication and self-service password reset is now possible with user actions in conditional access policy. This preview feature is available to organizations who have enabled the [combined registration preview](../authentication/concept-registration-mfa-sspr-combined.md). This functionality may be enabled in organizations where they want users to register for Azure Multi-Factor Authentication and SSPR from a central location such as a trusted network location during HR onboarding. For more information about creating trusted locations in conditional access, see the article [What is the location condition in Azure Active Directory conditional access?](../conditional-access/location-condition.md#named-locations)
54+
55+
### Create a policy to require registration from a trusted location
56+
57+
The following policy applies to all selected users, who attempt to register using the combined registration experience, and blocks access unless they are connecting from a location marked as trusted network.
58+
59+
![Create a CA policy to control security info registration](media/howto-registration-mfa-sspr-combined/conditional-access-register-security-info.png)
60+
61+
1. In the **Azure portal**, browse to **Azure Active Directory** > **Conditional access**
62+
1. Select **New policy**
63+
1. In Name, Enter a Name for this policy. For example, **Combined Security Info Registration on Trusted Networks**
64+
1. Under **Assignments**, click **Users and groups**, and select the users and groups you want this policy to apply to
65+
66+
> [!WARNING]
67+
> Users must be enabled for the [combined registration preview](../authentication/howto-registration-mfa-sspr-combined.md).
68+
69+
1. Under **Cloud apps or actions**, select **User actions**, check **Register security information (preview)**
70+
1. Under **Conditions** > **Locations**
71+
1. Configure **Yes**
72+
1. Include **Any location**
73+
1. Exclude **All trusted locations**
74+
1. Click **Done** on the Locations blade
75+
1. Click **Done** on the Conditions blade
76+
1. Under **Access controls** > **Grant**
77+
1. Click **Block access**
78+
1. Then click **Select**
79+
1. Set **Enable policy** to **On**
80+
1. Then click **Create**
81+
5182
## Next steps
5283

5384
[Available methods for Multi-Factor Authentication and SSPR](concept-authentication-methods.md)
@@ -56,4 +87,6 @@ If you have configured the Site to Zone Assignment List in Internet Explorer, th
5687

5788
[Configure Azure Multi-Factor Authentication](howto-mfa-getstarted.md)
5889

59-
[Troubleshooting combined security info registration](howto-registration-mfa-sspr-combined-troubleshoot.md)
90+
[Troubleshooting combined security info registration](howto-registration-mfa-sspr-combined-troubleshoot.md)
91+
92+
[What is the location condition in Azure Active Directory conditional access?](../conditional-access/location-condition.md)
Loading

articles/active-directory/conditional-access/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,8 @@
5050
href: app-protection-based-conditional-access.md
5151
- name: Require managed devices
5252
href: require-managed-devices.md
53+
- name: Require trusted networks for MFA registration
54+
href: ../authentication/howto-registration-mfa-sspr-combined.md#conditional-access-policies-for-combined-registration
5355
- name: Require MFA for access attempts from untrusted networks
5456
href: untrusted-networks.md
5557
- name: Require Terms of use

articles/active-directory/conditional-access/conditions.md

Lines changed: 10 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -56,29 +56,23 @@ When you **Select users and groups**, you can set the following options:
5656

5757
* **Users and groups** targets specific sets of users. For example, you can select a group that contains all members of the HR department when an HR app is selected as the cloud app. A group can be any type of group in Azure AD, including dynamic or assigned security and distribution groups.
5858

59-
You can also exclude specific users or groups from a policy. One common use case is service accounts if your policy enforces multifactor authentication (MFA).
59+
You can also exclude specific users or groups from a policy. One common use case is service accounts if your policy enforces multifactor authentication (MFA).
6060

61-
Targeting specific sets of users is useful for the deployment of a new policy. In a new policy, you should target only an initial set of users to validate the policy behavior.
61+
Targeting specific sets of users is useful for the deployment of a new policy. In a new policy, you should target only an initial set of users to validate the policy behavior.
6262

63+
## Cloud apps and actions
6364

65+
A cloud app is a website, service, or endpoint protected by Azure AD Application Proxy. For a detailed description of supported cloud apps, see [cloud apps assignments](technical-reference.md#cloud-apps-assignments). The **Cloud apps or actions** condition is mandatory in a conditional access policy. In your policy, you can either select **All cloud apps** or specify apps with **Select apps**.
6466

65-
## Cloud apps
67+
Organizations can choose from the following:
6668

67-
A cloud app is a website or service. Websites protected by the Azure AD Application Proxy are also cloud apps. For a detailed description of supported cloud apps, see [cloud apps assignments](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access-technical-reference#cloud-apps-assignments).
68-
69-
The **cloud apps** condition is mandatory in a conditional access policy. In your policy, you can either select **All cloud apps** or select specific apps.
70-
71-
![Include cloud apps](./media/conditions/03.png)
72-
73-
Select:
74-
75-
- **All cloud apps** to baseline policies to apply to the entire organization. Use this selection for policies that require multifactor authentication when sign-in risk is detected for any cloud app. A policy applied to **All cloud apps** applies to access to all websites and services. This setting isn't limited to the cloud apps that appear on the **Select apps** list.
76-
77-
- **Select apps** to target specific services by your policy. For example, you can require users to have a [compliant device](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access-mam#app-based-or-compliant-device-policy-for-exchange-online-and-sharepoint-online) to access SharePoint Online. This policy is also applied to other services when they access SharePoint content. An example is Microsoft Teams.
78-
79-
You can exclude specific apps from a policy. However, these apps are still subject to the policies applied to the services they access.
69+
* **All cloud apps** when applying baseline policies to apply to the entire organization. Use this selection for policies that require multi-factor authentication when sign-in risk is detected for any cloud app. A policy applied to All cloud apps applies to access to all websites and services. This setting isn't limited to the cloud apps that appear on the Select apps list.
70+
* **Select apps** to target specific services by your policy. For example, you can require users to have a compliant device to access SharePoint Online. This policy is also applied to other services when they access SharePoint content. An example is Microsoft Teams.
8071

72+
> [!NOTE]
73+
> You can exclude specific apps from a policy. However, these apps are still subject to the policies applied to the services they access.
8174
75+
**User actions** are tasks that can be performed by a user. The only currently supported action is **Register security information (preview)**, which allows conditional access policy to enforce when a user registers their security information.
8276

8377
## Sign-in risk
8478

articles/active-directory/conditional-access/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ A conditional access policy is a definition of an access scenario using the foll
6262

6363
- **[Users](conditions.md#users-and-groups)**: The users performing an access attempt (**Who**).
6464

65-
- **[Cloud apps](conditions.md#cloud-apps)**: The targets of an access attempt (**What**).
65+
- **[Cloud apps](conditions.md#cloud-apps-and-actions)**: The targets of an access attempt (**What**).
6666

6767
These two conditions are mandatory in a conditional access policy. In addition to the two mandatory conditions, you can also include additional conditions that describe how the access attempt is performed. Common examples are using mobile devices or locations that are outside your corporate network. For more information, see [Conditions in Azure Active Directory conditional access](conditions.md).
6868

articles/active-directory/conditional-access/technical-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ If this is not the information you are looking for, please leave a comment at th
3131

3232
## Cloud apps assignments
3333

34-
With conditional access policies, you control how your users access your [cloud apps](conditions.md#cloud-apps). When you configure a conditional access policy, you need to select at least one cloud app.
34+
With conditional access policies, you control how your users access your [cloud apps](conditions.md#cloud-apps-and-actions). When you configure a conditional access policy, you need to select at least one cloud app.
3535

3636
![Select the cloud apps for your policy](./media/technical-reference/09.png)
3737

articles/active-directory/identity-protection/notifications.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,14 +35,16 @@ This article provides you with an overview of both notification emails.
3535

3636
In response to a detected account at risk, Azure AD Identity Protection generates an email alert with **Users at risk detected** as subject. The email includes a link to the **[Users flagged for risk](../reports-monitoring/concept-user-at-risk.md)** report. As a best practice, you should immediately investigate the users at risk.
3737

38+
The configuration for this alert allows you to specify at what user risk level you want the alert to be generated. The email will be generated when the user's risk level reaches what you have specified; however, you will not receive new users at risk detected email alerts for this user after they move to this user risk level. For example, if you set the policy to alert on medium user risk and your user John moves to medium risk, you will receive the users at risk detected email for John. However, you will not receive a second users at risk detected alert if John then moves to high risk or has additional risk events.
39+
3840
![Users at risk detected email](./media/notifications/01.png)
3941

4042

4143
### Configuration
4244

4345
As an administrator, you can set:
4446

45-
- **The risk level that triggers the generation of this email** - By default, the risk level is set to “High” risk.
47+
- **The user risk level that triggers the generation of this email** - By default, the risk level is set to “High” risk.
4648
- **The recipients of this email** - By default, recipients include all Global Admins. Global Admins can also add other Global Admins, Security Admins, Security Readers as recipients.
4749

4850

articles/active-directory/manage-apps/application-proxy-configure-hard-coded-link-translation.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,13 +55,14 @@ With the MyApps Browser Extension, all internal URLs published with Application
5555

5656
To use this feature, the user needs to download the extension and be logged in. There is no other configuration needed for admins or the users.
5757

58-
58+
To learn more, including how to configure this option, please see the [MyApps Browser Extension](https://docs.microsoft.com/en-us/azure/active-directory/user-help/my-apps-portal-end-user-access#download-and-install-the-my-apps-secure-sign-in-extension) documentation.
5959

6060
### Option 3: Link Translation Setting
6161

62-
When link translation is enabled, the Application Proxy service searches through HTML and CSS for published internal links and translates them so that your users get an uninterrupted experience.
63-
62+
When link translation is enabled, the Application Proxy service searches through HTML and CSS for published internal links and translates them so that your users get an uninterrupted experience. Using the MyApps Browser Extension is preferred to the Link Translation Setting since it gives a more performant experience to users.
6463

64+
> [!NOTE]
65+
> If you are using option 2 or 3, only one of these should be enabled at a time.
6566
6667
## How link translation works
6768

articles/active-directory/manage-apps/application-proxy-qlik.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: Azure AD App Proxy and Qlik Sense| Microsoft Docs
33
description: Turn on Application Proxy in the Azure portal, and install the Connectors for the reverse proxy.
44
services: active-directory
55
documentationcenter: ''
6-
author: CelesteDG
7-
manager: mtillman
6+
author: msmimart
7+
manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: app-mgmt
1010
ms.workload: identity
1111
ms.topic: article
1212
ms.date: 09/06/2018
13-
ms.author: celested
13+
ms.author: mimart
1414
ms.reviewer: japere
1515
ms.custom: it-pro
1616

articles/active-directory/manage-apps/application-proxy-register-connector-powershell.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Silent install Azure AD App Proxy connector | Microsoft Docs
33
description: Covers how to perform an unattended installation of Azure AD Application Proxy Connector to provide secure remote access to your on-premises apps.
44
services: active-directory
55
documentationcenter: ''
6-
author: CelesteDG
7-
manager: mtillman
6+
author: msmimart
7+
manager: CelesteDG
88

99
ms.service: active-directory
1010
ms.subservice: app-mgmt
@@ -13,7 +13,7 @@ ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: conceptual
1515
ms.date: 05/17/2018
16-
ms.author: celested
16+
ms.author: mimart
1717
ms.reviewer: japere
1818
ms.custom: it-pro
1919
ms.collection: M365-identity-device-management

0 commit comments

Comments
 (0)