Skip to content

Commit 37385ab

Browse files
authored
Merge pull request #214331 from MicrosoftDocs/main
10/12 OOB Publish
2 parents dc99e12 + f8c6924 commit 37385ab

File tree

394 files changed

+4938
-2917
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

394 files changed

+4938
-2917
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/authentication/concept-certificate-based-authentication-mobile.md",
5+
"redirect_url": "/azure/active-directory/authentication/concept-certificate-based-authentication-mobile-ios",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/active-directory/authentication/troubleshoot-certificate-based-authentication.md",
10+
"redirect_url": "/azure/active-directory/authentication/certificate-based-authentication-faq",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/active-directory/manage-apps/my-apps-deployment-plan.md",
515
"redirect_url": "/azure/active-directory/manage-apps/myapps-overview",
@@ -30,6 +40,11 @@
3040
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
3141
"redirect_document_id": false
3242
},
43+
{
44+
"source_path_from_root": "/articles/active-directory/saas-apps/keylight-tutorial.md",
45+
"redirect_url": "/azure/active-directory/saas-apps/navex-irm-keylight-lockpath-tutorial",
46+
"redirect_document_id": false
47+
},
3348
{
3449
"source_path_from_root": "/articles/active-directory/fundamentals/whats-new-microsoft-365-government.md",
3550
"redirect_url": "/azure/active-directory/fundamentals/whats-new",

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/api-management/developer-portal-widget-contribution-guidelines.md",
5+
"redirect_url": "/azure/api-management/developer-portal-extend-custom-functionality",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/api-management/developer-portal-use-community-widgets.md",
10+
"redirect_url": "/azure/api-management/developer-portal-extend-custom-functionality",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path": "articles/backup/sap-hana-db-manage.md",
515
"redirect_url": "/azure/backup/sap-hana-database-manage",
@@ -28928,6 +28938,11 @@
2892828938
"source_path": "articles/virtual-machines/workloads/redhat/wildfly-on-centos.md",
2892928939
"redirect_url": "/azure/developer/java/ee/jboss-on-azure",
2893028940
"redirect_document_id": false
28941+
},
28942+
{
28943+
"source_path": "articles/aks/keda-troubleshoot.md",
28944+
"redirect_url": "/troubleshoot/azure/azure-kubernetes/troubleshoot-kubernetes-event-driven-autoscaling-add-on?context=/azure/aks/context/aks-context",
28945+
"redirect_document_id": false
2893128946
}
2893228947
]
2893328948
}

articles/active-directory/authentication/TOC.yml

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -190,24 +190,26 @@
190190
href: howto-password-smart-lockout.md
191191
- name: Certificate-based authentication
192192
items:
193-
- name: Azure AD CBA (Preview)
193+
- name: Azure AD CBA
194194
items:
195195
- name: Overview
196196
href: concept-certificate-based-authentication.md
197197
- name: How Azure AD CBA works
198198
href: concept-certificate-based-authentication-technical-deep-dive.md
199-
- name: Limitations
200-
href: concept-certificate-based-authentication-limitations.md
201199
- name: Configure Azure AD CBA
202200
href: how-to-certificate-based-authentication.md
203201
- name: Windows SmartCard logon
204202
href: concept-certificate-based-authentication-smartcard.md
205-
- name: Mobile devices
206-
href: concept-certificate-based-authentication-mobile.md
203+
- name: iOS devices
204+
href: concept-certificate-based-authentication-mobile-ios.md
205+
- name: Android devices
206+
href: concept-certificate-based-authentication-mobile-android.md
207+
- name: Certificate user IDs
208+
href: concept-certificate-based-authentication-certificateuserids.md
209+
- name: Migrate federated users
210+
href: concept-certificate-based-authentication-migration.md
207211
- name: FAQ
208212
href: certificate-based-authentication-faq.yml
209-
- name: Troubleshoot
210-
href: troubleshoot-certificate-based-authentication.md
211213
- name: Federated CBA with Azure AD
212214
items:
213215
- name: Configure CBA with federation

articles/active-directory/authentication/active-directory-certificate-based-authentication-android.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Android certificate-based authentication - Azure Active Directory
2+
title: Android certificate-based authentication with federation - Azure Active Directory
33
description: Learn about the supported scenarios and the requirements for configuring certificate-based authentication in solutions with Android devices
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/16/2022
9+
ms.date: 09/30/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -15,7 +15,7 @@ ms.reviewer: annaba
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Azure Active Directory certificate-based authentication on Android
18+
# Azure Active Directory certificate-based authentication with federation on Android
1919

2020
Android devices can use certificate-based authentication (CBA) to authenticate to Azure Active Directory using a client certificate on their device when connecting to:
2121

@@ -46,26 +46,28 @@ The device OS version must be Android 5.0 (Lollipop) and above.
4646

4747
A federation server must be configured.
4848

49-
For Azure Active Directory to revoke a client certificate, the ADFS token must have the following claims:
49+
For Azure Active Directory to revoke a client certificate, the AD FS token must have the following claims:
5050

5151
* `http://schemas.microsoft.com/ws/2008/06/identity/claims/<serialnumber>`
5252
(The serial number of the client certificate)
5353
* `http://schemas.microsoft.com/2012/12/certificatecontext/field/<issuer>`
5454
(The string for the issuer of the client certificate)
5555

56-
Azure Active Directory adds these claims to the refresh token if they are available in the ADFS token (or any other SAML token). When the refresh token needs to be validated, this information is used to check the revocation.
56+
Azure Active Directory adds these claims to the refresh token if they're available in the AD FS token (or any other SAML token). When the refresh token needs to be validated, this information is used to check the revocation.
5757

58-
As a best practice, you should update your organization's ADFS error pages with the following information:
58+
As a best practice, you should update your organization's AD FS error pages with the following information:
5959

6060
* The requirement for installing the Microsoft Authenticator on Android.
6161
* Instructions on how to get a user certificate.
6262

6363
For more information, see [Customizing the AD FS Sign-in Pages](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn280950(v=ws.11)).
6464

65-
Some Office apps (with modern authentication enabled) send '*prompt=login*' to Azure AD in their request. By default, Azure AD translates '*prompt=login*' in the request to ADFS as '*wauth=usernamepassworduri*' (asks ADFS to do U/P Auth) and '*wfresh=0*' (asks ADFS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, you need to modify the default Azure AD behavior. Set the '*PromptLoginBehavior*' in your federated domain settings to '*Disabled*'.
65+
Office apps with modern authentication enabled send '*prompt=login*' to Azure AD in their request. By default, Azure AD translates '*prompt=login*' in the request to AD FS as '*wauth=usernamepassworduri*' (asks AD FS to do U/P Auth) and '*wfresh=0*' (asks AD FS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, you need to modify the default Azure AD behavior. Set the '*PromptLoginBehavior*' in your federated domain settings to '*Disabled*'.
6666
You can use the [MSOLDomainFederationSettings](/powershell/module/msonline/set-msoldomainfederationsettings) cmdlet to perform this task:
6767

68-
`Set-MSOLDomainFederationSettings -domainname <domain> -PromptLoginBehavior Disabled`
68+
```powershell
69+
Set-MSOLDomainFederationSettings -domainname <domain> -PromptLoginBehavior Disabled
70+
```
6971

7072
## Exchange ActiveSync clients support
7173

articles/active-directory/authentication/active-directory-certificate-based-authentication-ios.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
11
---
2-
title: Certificate-based authentication on iOS - Azure Active Directory
2+
title: Certificate-based authentication with federation on iOS - Azure Active Directory
33
description: Learn about the supported scenarios and the requirements for configuring certificate-based authentication for Azure Active Directory in solutions with iOS devices
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 05/04/2022
9+
ms.date: 09/30/2022
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
1414

1515
ms.collection: M365-identity-device-management
1616
---
17-
# Azure Active Directory certificate-based authentication on iOS
17+
# Azure Active Directory certificate-based authentication with federation on iOS
1818

1919
To improve security, iOS devices can use certificate-based authentication (CBA) to authenticate to Azure Active Directory (Azure AD) using a client certificate on their device when connecting to the following applications or services:
2020

@@ -46,21 +46,21 @@ To use CBA with iOS, the following requirements and considerations apply:
4646

4747
* The device OS version must be iOS 9 or above.
4848
* Microsoft Authenticator is required for Office applications on iOS.
49-
* An identity preference must be created in the macOS Keychain that include the authentication URL of the ADFS server. For more information, see [Create an identity preference in Keychain Access on Mac](https://support.apple.com/guide/keychain-access/create-an-identity-preference-kyca6343b6c9/mac).
49+
* An identity preference must be created in the macOS Keychain that includes the authentication URL of the AD FS server. For more information, see [Create an identity preference in Keychain Access on Mac](https://support.apple.com/guide/keychain-access/create-an-identity-preference-kyca6343b6c9/mac).
5050

51-
The following Active Directory Federation Services (ADFS) requirements and considerations apply:
51+
The following Active Directory Federation Services (AD FS) requirements and considerations apply:
5252

53-
* The ADFS server must be enabled for certificate authentication and use federated authentication.
53+
* The AD FS server must be enabled for certificate authentication and use federated authentication.
5454
* The certificate needs to have to use Enhanced Key Usage (EKU) and contain the UPN of the user in the *Subject Alternative Name (NT Principal Name)*.
5555

56-
## Configure ADFS
56+
## Configure AD FS
5757

58-
For Azure AD to revoke a client certificate, the ADFS token must have the following claims. Azure AD adds these claims to the refresh token if they're available in the ADFS token (or any other SAML token). When the refresh token needs to be validated, this information is used to check the revocation:
58+
For Azure AD to revoke a client certificate, the AD FS token must have the following claims. Azure AD adds these claims to the refresh token if they're available in the AD FS token (or any other SAML token). When the refresh token needs to be validated, this information is used to check the revocation:
5959

6060
* `http://schemas.microsoft.com/ws/2008/06/identity/claims/<serialnumber>` - add the serial number of your client certificate
6161
* `http://schemas.microsoft.com/2012/12/certificatecontext/field/<issuer>` - add the string for the issuer of your client certificate
6262

63-
As a best practice, you also should update your organization's ADFS error pages with the following information:
63+
As a best practice, you also should update your organization's AD FS error pages with the following information:
6464

6565
* The requirement for installing the Microsoft Authenticator on iOS.
6666
* Instructions on how to get a user certificate.
@@ -69,7 +69,7 @@ For more information, see [Customizing the AD FS sign in page](/previous-version
6969

7070
## Use modern authentication with Office apps
7171

72-
Some Office apps with modern authentication enabled send `prompt=login` to Azure AD in their request. By default, Azure AD translates `prompt=login` in the request to ADFS as `wauth=usernamepassworduri` (asks ADFS to do U/P Auth) and `wfresh=0` (asks ADFS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, modify the default Azure AD behavior.
72+
Some Office apps with modern authentication enabled send `prompt=login` to Azure AD in their request. By default, Azure AD translates `prompt=login` in the request to AD FS as `wauth=usernamepassworduri` (asks AD FS to do U/P Auth) and `wfresh=0` (asks AD FS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, modify the default Azure AD behavior.
7373

7474
To update the default behavior, set the '*PromptLoginBehavior*' in your federated domain settings to *Disabled*. You can use the [MSOLDomainFederationSettings](/powershell/module/msonline/set-msoldomainfederationsettings) cmdlet to perform this task, as shown in the following example:
7575

0 commit comments

Comments
 (0)