Skip to content

Commit 375be3d

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into apimfreecert
2 parents 3729e28 + 2d03804 commit 375be3d

File tree

626 files changed

+8146
-3281
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

626 files changed

+8146
-3281
lines changed

.github/workflows/stale.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,7 @@ jobs:
1919
close-pr-label: auto-close
2020
exempt-pr-labels: keep-open
2121
operations-per-run: 1200
22-
ascending: true
23-
start-date: '2021-07-29'
22+
ascending: false
2423
stale-pr-message: >
2524
This pull request has been inactive for at least 14 days.
2625
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.docs.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation) for instructions.

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,11 @@
1010
"redirect_url": "/azure/active-directory/manage-apps/what-is-application-management",
1111
"redirect_document_id": false
1212
},
13+
{
14+
"source_path_from_root": "/articles/active-directory/authentication/how-to-nudge-authenticator-app.md",
15+
"redirect_url": "/azure/active-directory/authentication/how-to-mfa-registration-campaign",
16+
"redirect_document_id": false
17+
},
1318
{
1419
"source_path_from_root": "/articles/active-directory/develop/active-directory-v2-limitations.md",
1520
"redirect_url": "/azure/active-directory/azuread-dev/azure-ad-endpoint-comparison",

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@
5353
href: ../active-directory/develop/v2-app-types.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
5454
- name: Authentication library
5555
href: ../active-directory/develop/msal-overview.md?bc=%2fazure%2factive-directory-b2c%2fbread%2ftoc.json&toc=%2fazure%2factive-directory-b2c%2fTOC.json
56+
displayName: MSAL, client library, Microsoft Authentication Library
5657
- name: Azure AD B2C best practices
5758
href: best-practices.md
5859
- name: Application types
@@ -595,6 +596,7 @@
595596
href: app-registrations-training-guide.md
596597
- name: Billing model
597598
href: billing.md
599+
displayName: pricing model
598600
- name: Code samples
599601
href: /samples/browse/?terms=b2c
600602
- name: Cookie definitions

articles/active-directory-b2c/billing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.topic: reference
1010
ms.workload: identity
11-
ms.date: 11/11/2021
11+
ms.date: 11/16/2021
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -48,7 +48,7 @@ MAU billing went into effect for Azure AD B2C tenants on **November 1, 2019**. A
4848

4949
Your Azure AD B2C tenant must also be linked to the appropriate Azure pricing tier based on the features you want to use. Premium features require Azure AD B2C [Premium P1 or P2 pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/). You might need to upgrade your pricing tier as you use new features. For example, for risk-based Conditional Access policies, you’ll need to select the Azure AD B2C Premium P2 pricing tier for your tenant.
5050
> [!NOTE]
51-
> Your first 50,000 MAUs per month are free for both Premium P1 and Premium P2 features, but **this free tier doesn’t apply to subscriptions with free trial credits**. To determine the total number of MAUs, we combine MAUs from all your tenants (both Azure AD and Azure AD B2C) that are linked to the same subscription.
51+
> Your first 50,000 MAUs per month are free for both Premium P1 and Premium P2 features, but the **free tier doesn’t apply to free trial, credit-based, or sponsorship subscriptions**. Once the free trial period or credits expire for these types of subscriptions, you'll begin to be charged for Azure AD B2C MAUs. To determine the total number of MAUs, we combine MAUs from all your tenants (both Azure AD and Azure AD B2C) that are linked to the same subscription.
5252
## Link an Azure AD B2C tenant to a subscription
5353

5454
Usage charges for Azure Active Directory B2C (Azure AD B2C) are billed to an Azure subscription. You need to explicitly link an Azure AD B2C tenant to an Azure subscription by creating an Azure AD B2C *resource* within the target Azure subscription. Several Azure AD B2C resources can be created in a single Azure subscription, along with other Azure resources like virtual machines, Storage accounts, and Logic Apps. You can see all of the resources within a subscription by going to the Azure Active Directory (Azure AD) tenant that the subscription is associated with.

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 07/07/2021
11+
ms.date: 11/15/2021
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -253,6 +253,7 @@ The request format in the PATCH and POST differ. To ensure that POST and PATCH a
253253
- **Things to consider**
254254
- All roles will be provisioned as primary = false.
255255
- The POST contains the role type. The PATCH request does not contain type. We are working on sending the type in both POST and PATCH requests.
256+
- AppRoleAssignmentsComplex is not compatible with setting scope to "Sync All users and groups."
256257

257258
- **Example output**
258259

articles/active-directory/authentication/TOC.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -162,8 +162,12 @@
162162
href: howto-password-ban-bad-on-premises-faq.yml
163163
- name: Agent version history
164164
href: howto-password-ban-bad-on-premises-agent-versions.md
165-
- name: Nudge Microsoft Authenticator setup (Preview)
166-
href: how-to-nudge-authenticator-app.md
165+
- name: Run a registration campaign
166+
href: how-to-mfa-registration-campaign.md
167+
- name: Use number matching (Preview)
168+
href: how-to-mfa-number-match.md
169+
- name: Use additional context (Preview)
170+
href: how-to-mfa-additional-context.md
167171
- name: Use Microsoft managed settings
168172
href: how-to-mfa-microsoft-managed.md
169173
- name: Use a Temporary Access Pass (Preview)

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,6 @@ The following providers offer FIDO2 security keys of different form factors that
124124
| KONA I | ![y] | ![n]| ![y]| ![y]| ![n] | https://konai.com/business/security/fido |
125125
| NEOWAVE | ![n] | ![y]| ![y]| ![n]| ![n] | https://neowave.fr/en/products/fido-range/ |
126126
| Nymi | ![y] | ![n]| ![y]| ![n]| ![n] | https://www.nymi.com/nymi-band |
127-
| Octatco | ![y] | ![y]| ![n]| ![n]| ![n] | https://octatco.com/ |
128127
| OneSpan Inc. | ![n] | ![y]| ![n]| ![y]| ![n] | https://www.onespan.com/products/fido |
129128
| Thales Group | ![n] | ![y]| ![y]| ![n]| ![n] | https://cpl.thalesgroup.com/access-management/authenticators/fido-devices |
130129
| Thetis | ![y] | ![y]| ![y]| ![y]| ![n] | https://thetis.io/collections/fido2 |
Lines changed: 196 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,196 @@
1+
---
2+
title: Use additional context in multifactor authentication (MFA) notifications (Preview) - Azure Active Directory
3+
description: Learn how to use additional context in MFA notifications
4+
services: active-directory
5+
ms.service: active-directory
6+
ms.subservice: authentication
7+
ms.topic: conceptual
8+
ms.date: 11/16/2021
9+
10+
ms.author: justinha
11+
author: mjsantani
12+
manager: daveba
13+
14+
ms.collection: M365-identity-device-management
15+
16+
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
17+
---
18+
# How to use additional context in multifactor authentication (MFA) notifications (Preview) - Authentication Methods Policy
19+
20+
This topic covers how to improve the security of user sign-in by adding application location based on IP address in Microsoft Authenticator push notifications.
21+
22+
## Prerequisites
23+
24+
Your organization will need to enable Microsoft Authenticator push notifications for some users or groups using the new Authentication Methods Policy API.
25+
26+
>[!NOTE]
27+
>Additional context can be targeted to only a single group, which can be dynamic or nested. On-premises synchronized security groups and cloud-only security groups are supported for the Authentication Method Policy.
28+
29+
## Passwordless phone sign-in and multifactor authentication
30+
31+
When a user receives a Passwordless phone sign-in or MFA push notification in the Microsoft Authenticator app, they'll see the name of the application that requests the approval and the app location based on its IP address.
32+
33+
![Screenshot of additional context in the MFA push notification.](media/howto-authentication-passwordless-phone/location.png)
34+
35+
The additional context can be combined with [number matching](how-to-mfa-number-match.md) to further improve sign-in security.
36+
37+
![Screenshot of additional context with number matching in the MFA push notification.](media/howto-authentication-passwordless-phone/location-with-number-match.png)
38+
39+
### Policy schema changes
40+
41+
Identify a single target group for the schema configuration. Then use the following API endpoint to change the displayAppInformationRequiredState property to **enabled**:
42+
43+
https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
44+
45+
46+
#### MicrosoftAuthenticatorAuthenticationMethodConfiguration properties
47+
48+
**PROPERTIES**
49+
50+
| Property | Type | Description |
51+
|---------|------|-------------|
52+
| id | String | The authentication method policy identifier. |
53+
| state | authenticationMethodState | Possible values are: **enabled**<br>**disabled** |
54+
55+
**RELATIONSHIPS**
56+
57+
| Relationship | Type | Description |
58+
|--------------|------|-------------|
59+
| includeTargets | [microsoftAuthenticatorAuthenticationMethodTarget](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget.md?view=graph-rest-beta) |
60+
| collection | A collection of users or groups who are enabled to use the authentication method. |
61+
62+
#### MicrosoftAuthenticator includeTarget properties
63+
64+
**PROPERTIES**
65+
66+
| Property | Type | Description |
67+
|----------|------|-------------|
68+
| authenticationMode | String | Possible values are:<br>**any**: Both passwordless phone sign-in and traditional second factor notifications are allowed.<br>**deviceBasedPush**: Only passwordless phone sign-in notifications are allowed.<br>**push**: Only traditional second factor push notifications are allowed. |
69+
| id | String | Object ID of an Azure AD user or group. |
70+
| targetType | authenticationMethodTargetType | Possible values are: **user**, **group**.<br>You can only set one group or user for additional context. |
71+
| displayAppInformationRequiredState | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
72+
73+
>[!NOTE]
74+
>Additional context can only be enabled for a single group.
75+
76+
#### Example of how to enable additional context for all users
77+
78+
Change the **displayAppInformationRequiredState** from **default** to **enabled**.
79+
80+
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you do not want to allow passwordless, use **push**.
81+
82+
You need to PATCH the entire includeTarget to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example only shows the update to the **displayAppInformationRequiredState**.
83+
84+
```json
85+
//Retrieve your existing policy via a GET.
86+
//Leverage the Response body to create the Request body section. Then update the Request body similar to the Request body as shown below.
87+
//Change the Query to PATCH and Run query
88+
89+
{
90+
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
91+
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
92+
"id": "MicrosoftAuthenticator",
93+
"state": "enabled",
94+
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
95+
"includeTargets": [
96+
{
97+
"targetType": "group",
98+
"id": "all_users",
99+
"authenticationMode": "any",
100+
"displayAppInformationRequiredState": "enabled",
101+
"numberMatchingRequiredState": "enabled"
102+
}
103+
]
104+
}
105+
106+
```
107+
108+
To confirm this update has applied, run the GET request below using the endpoint below.
109+
GET - https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
110+
111+
112+
#### Example of how to enable additional context for a single group
113+
114+
Change the **displayAppInformationRequiredState** value from **default** to **enabled.**
115+
Change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
116+
117+
You need to PATCH the entire includeTarget to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **displayAppInformationRequiredState**.
118+
119+
```json
120+
//Copy paste the below in the Request body section as shown below.
121+
//Leverage the Response body to create the Request body section. Then update the Request body similar to the Request body as shown below.
122+
//Change query to PATCH and run query
123+
124+
{
125+
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
126+
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
127+
"id": "MicrosoftAuthenticator",
128+
"state": "enabled",
129+
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
130+
"includeTargets": [
131+
{
132+
"targetType": "group",
133+
"id": "1ca44590-e896-4dbe-98ed-b140b1e7a53a”,
134+
"authenticationMode": "any",
135+
"displayAppInformationRequiredState": "enabled",
136+
"numberMatchingRequiredState": "enabled"
137+
}
138+
]
139+
}
140+
```
141+
142+
To verify, RUN GET again and verify the ObjectID
143+
GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
144+
145+
146+
#### Example of error when enabling additional context for multiple groups
147+
148+
The PATCH request will fail with 400 Bad Request and the error will contain the following message:
149+
150+
`Persistance of policy failed with error: You cannot enable multiple targets for feature 'Require Display App Information'. Choose only one of the following includeTargets to enable: aede0efe-c1b4-40dc-8ae7-2c402f23e312,aede0efe-c1b4-40dc-8ae7-2c402f23e317.`
151+
152+
### Test the end-user experience
153+
Add the test user account to the Microsoft Authenticator app. The account **doesn't** need to be enabled for phone sign-in.
154+
155+
See the end-user experience of an Authenticator MFA push notification with additional context by signing into aka.ms/MFAsetup.
156+
157+
### Turn off additional context
158+
159+
To turn off additional context, you'll need to PATCH remove **displayAppInformationRequiredState** from **enabled** to **disabled**/**default**.
160+
161+
```json
162+
{
163+
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
164+
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
165+
"id": "MicrosoftAuthenticator",
166+
"state": "enabled",
167+
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
168+
"includeTargets": [
169+
{
170+
"targetType": "group",
171+
"id": "all_users",
172+
"authenticationMode": "any",
173+
"displayAppInformationRequiredState": "enabled",
174+
"numberMatchingRequiredState": "default"
175+
}
176+
]
177+
}
178+
```
179+
180+
## Enable additional context in the portal
181+
182+
To enable additional context in the Azure AD portal, complete the following steps:
183+
184+
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
185+
1. Select the target users, click the three dots on the right, and click **Configure**.
186+
187+
![Screenshot of how to configure number match.](media/howto-authentication-passwordless-phone/configure.png)
188+
189+
1. Select the **Authentication mode**, and then for **Show additional context in notifications (Preview)**, click **Enable**, and then click **Done**.
190+
191+
![Screenshot of enabling additional context.](media/howto-authentication-passwordless-phone/enable-additional-context.png)
192+
193+
## Next steps
194+
195+
[Authentication methods in Azure Active Directory - Microsoft Authenticator app](concept-authentication-authenticator-app.md)
196+

articles/active-directory/authentication/how-to-mfa-microsoft-managed.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 11/03/2021
9+
ms.date: 11/11/2021
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -18,17 +18,21 @@ ms.collection: M365-identity-device-management
1818
---
1919
# How to use Microsoft managed settings - Authentication Methods Policy
2020

21+
<!---what API--->
22+
2123
In addition to configuring Authentication Methods Policy settings to be either **Enabled** or **Disabled**, IT admins can configure some settings to be **Microsoft managed**. A setting that is configured as **Microsoft managed** allows Azure AD to enable or disable the setting.
2224

25+
The option to let Azure AD manage the setting is a convenient way for an organization to allow Microsoft to enable or disable a feature by default. Organizations can more easily improve their security posture by trusting Microsoft to manage when a feature should be enabled by default. By configuring a setting as **Microsoft managed** (named *default* in Graph APIs), IT admins can trust Microsoft to enable a security feature they have not explicitly disabled.
26+
2327
## Settings that can be Microsoft managed
2428

2529
The following table lists settings that can be set to Microsoft managed and whether it is enabled or disabled.
2630

27-
| Setting | Configuration |
28-
|-----------------|---------------|
29-
| [Registration campaign](how-to-nudge-authenticator-app.md) | Disabled |
30-
| Number match | Disabled |
31-
| Additional context | Disabled |
31+
| Setting | Configuration |
32+
|---------------------------------------------------------------------------------------------------------------------------------|---------------|
33+
| [Registration campaign](how-to-mfa-registration-campaign.md) | Disabled |
34+
| [Number match](how-to-mfa-number-match.md) | Disabled |
35+
| [Additional context in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
3236

3337
## Next steps
3438

0 commit comments

Comments
 (0)