You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-technical-profile.md
+23-17Lines changed: 23 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,13 +60,13 @@ To read, update, or delete an existing user account, the input claim is a key th
60
60
61
61
To create a new user account, the input claim is a key that uniquely identifies a local or federated account. For example, local account: **signInNames.emailAddress**, or **signInNames.userName**. For a federated account: the **alternativeSecurityId**.
62
62
63
-
The InputClaimsTransformations element may contain a collection of input claims transformation elements that are used to modify the input claim or generate new one.
63
+
The [InputClaimsTransformations](technicalprofiles.md#inputclaimstransformations) element may contain a collection of input claims transformation elements that are used to modify the input claim or generate new one.
64
64
65
65
## OutputClaims
66
66
67
67
The **OutputClaims** element contains a list of claims returned by the Azure AD technical profile. You may need to map the name of the claim defined in your policy to the name defined in Azure Active Directory. You can also include claims that aren't returned by the Azure Active Directory, as long as you set the `DefaultValue` attribute.
68
68
69
-
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
69
+
The [OutputClaimsTransformations](technicalprofiles.md#outputclaimstransformations) element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
70
70
71
71
For example, the **AAD-UserWriteUsingLogonEmail** technical profile creates a local account and returns the following claims:
72
72
@@ -88,7 +88,7 @@ For example, the **AAD-UserWriteUsingLogonEmail** technical profile creates a lo
88
88
89
89
## PersistedClaims
90
90
91
-
The **PersistedClaims** element contains all of the values that should be persisted by Azure AD with possible mapping information between a claim type already defined in the ClaimsSchema section in the policy and the Azure AD attribute name.
91
+
The **PersistedClaims** element contains all of the values that should be persisted by Azure AD with possible mapping information between a claim type already defined in the [ClaimsSchema](claimsschema.md) section in the policy and the Azure AD attribute name.
92
92
93
93
The **AAD-UserWriteUsingLogonEmail** technical profile, which creates new local account, persists following claims:
94
94
@@ -119,9 +119,7 @@ The name of the claim is the name of the Azure AD attribute unless the **Partner
119
119
120
120
### Read
121
121
122
-
The **Read** operation reads data about a single user account. To read user data, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames** (any type, user name and email-based account) or **alternativeSecurityId**.
123
-
124
-
The following technical profile reads data about a user account using the user's objectId:
122
+
The **Read** operation reads data about a single user account. The following technical profile reads data about a user account using the user's objectId:
125
123
126
124
```XML
127
125
<TechnicalProfileId="AAD-UserReadUsingObjectId">
@@ -151,9 +149,7 @@ The following technical profile reads data about a user account using the user's
151
149
152
150
### Write
153
151
154
-
The **Write** operation creates or updates a single user account. To write a user account, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames.emailAddress**, or **alternativeSecurityId**.
155
-
156
-
The following technical profile creates new social account:
152
+
The **Write** operation creates or updates a single user account. The following technical profile creates new social account:
@@ -193,9 +189,7 @@ The following technical profile creates new social account:
193
189
194
190
### DeleteClaims
195
191
196
-
The **DeleteClaims** operation clears the information from a provided list of claims. To delete information from claims, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames.emailAddress** or **alternativeSecurityId**.
197
-
198
-
The following technical profile deletes claims:
192
+
The **DeleteClaims** operation clears the information from a provided list of claims. The following technical profile deletes claims:
@@ -216,9 +210,7 @@ The following technical profile deletes claims:
216
210
217
211
### DeleteClaimsPrincipal
218
212
219
-
The **DeleteClaimsPrincipal** operation deletes a single user account from the directory. To delete a user account, you need to provide a key as an input claim, such as **objectId**, **userPrincipalName**, **signInNames.emailAddress** or **alternativeSecurityId**.
220
-
221
-
The following technical profile deletes a user account from the directory using the user principal name:
213
+
The **DeleteClaimsPrincipal** operation deletes a single user account from the directory. The following technical profile deletes a user account from the directory using the user principal name:
@@ -253,13 +245,27 @@ The following technical profile deletes a social user account using **alternativ
253
245
| --------- | -------- | ----------- |
254
246
| Operation | Yes | The operation to be performed. Possible values: `Read`, `Write`, `DeleteClaims`, or `DeleteClaimsPrincipal`. |
255
247
| RaiseErrorIfClaimsPrincipalDoesNotExist | No | Raise an error if the user object does not exist in the directory. Possible values: `true` or `false`. |
256
-
| UserMessageIfClaimsPrincipalDoesNotExist | No | If an error is to be raised (see the RaiseErrorIfClaimsPrincipalDoesNotExist attribute description), specify the message to show to the user if user object does not exist. The value can be [localized](localization.md).|
257
248
| RaiseErrorIfClaimsPrincipalAlreadyExists | No | Raise an error if the user object already exists. Possible values: `true` or `false`.|
258
-
| UserMessageIfClaimsPrincipalAlreadyExists | No | If an error is to be raised (see RaiseErrorIfClaimsPrincipalAlreadyExists attribute description), specify the message to show to the user if user object already exists. The value can be [localized](localization.md).|
259
249
| ApplicationObjectId | No | The application object identifier for extension attributes. Value: ObjectId of an application. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md). |
260
250
| ClientId | No | The client identifier for accessing the tenant as a third party. For more information, see [Use custom attributes in a custom profile edit policy](custom-policy-custom-attributes.md)|
261
251
| IncludeClaimResolvingInClaimsHandling | No | For input and output claims, specifies whether [claims resolution](claim-resolver-overview.md) is included in the technical profile. Possible values: `true`, or `false` (default). If you want to use a claims resolver in the technical profile, set this to `true`. |
262
252
253
+
### Error messages
254
+
255
+
The following settings can be used to configure the error message displayed upon failure. The metadata should be configured in the [self-asserted](self-asserted-technical-profile.md) technical profile. The error messages can be [localized](localization.md).
256
+
257
+
| Attribute | Required | Description |
258
+
| --------- | -------- | ----------- |
259
+
| UserMessageIfClaimsPrincipalAlreadyExists | No | If an error is to be raised (see RaiseErrorIfClaimsPrincipalAlreadyExists attribute description), specify the message to show to the user if user object already exists. |
260
+
| UserMessageIfClaimsPrincipalDoesNotExist | No | If an error is to be raised (see the RaiseErrorIfClaimsPrincipalDoesNotExist attribute description), specify the message to show to the user if user object does not exist. |
261
+
262
+
263
+
## Next steps
264
+
265
+
See the following article, for example of using Azure AD technical profile:
266
+
267
+
-[Add claims and customize user input using custom policies in Azure Active Directory B2C](custom-policy-configure-user-input.md)
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/tutorial-create-instance.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -134,7 +134,7 @@ With Azure AD DS successfully deployed, now configure the virtual network to all
134
134
135
135
1. The **Overview** tab for your managed domain shows some **Required configuration steps**. The first configuration step is to update DNS server settings for your virtual network. Once the DNS settings are correctly configured, this step is no longer shown.
136
136
137
-
The addresses listed are the domain controllers for use in the virtual network. In this example, those addresses are *10.1.0.4* and *10.1.0.5*. You can later find these IP addresses on the **Properties** tab.
137
+
The addresses listed are the domain controllers for use in the virtual network. In this example, those addresses are *10.0.1.4* and *10.0.1.5*. You can later find these IP addresses on the **Properties** tab.
138
138
139
139

Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-nps-extension-errors.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,7 +95,7 @@ If your users are [Having trouble with two-step verification](../user-help/multi
95
95
96
96
### Health check script
97
97
98
-
The [Azure MFA NPS Extension health check script](https://gallery.technet.microsoft.com/Azure-MFA-NPS-Extension-648de6bb) is available on the TechNet Gallery to perform a basic health check when troubleshooting the NPS extension. Run the script and choose option 3.
98
+
The [Azure MFA NPS Extension health check script](https://docs.microsoft.com/samples/azure-samples/azure-mfa-nps-extension-health-check/azure-mfa-nps-extension-health-check/) performs a basic health check when troubleshooting the NPS extension. Run the script and choose option 3.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-nps-extension.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ When using the NPS extension for Azure MFA, the authentication flow includes the
26
26
1.**NAS/VPN Server** receives requests from VPN clients and converts them into RADIUS requests to NPS servers.
27
27
2.**NPS Server** connects to Active Directory to perform the primary authentication for the RADIUS requests and, upon success, passes the request to any installed extensions.
28
28
3.**NPS Extension** triggers a request to Azure MFA for the secondary authentication. Once the extension receives the response, and if the MFA challenge succeeds, it completes the authentication request by providing the NPS server with security tokens that include an MFA claim, issued by Azure STS.
29
-
4.**Azure MFA** communicates with Azure Active Directory to retrieve the user’s details and performs the secondary authentication using a verification method configured to the user.
29
+
4.**Azure MFA** communicates with Azure Active Directory to retrieve the user's details and performs the secondary authentication using a verification method configured to the user.
30
30
31
31
The following diagram illustrates this high-level authentication request flow:
32
32
@@ -165,7 +165,7 @@ The installer creates a PowerShell script in this location: `C:\Program Files\Mi
165
165
- Create a self-signed certificate.
166
166
- Associate the public key of the certificate to the service principal on Azure AD.
167
167
- Store the cert in the local machine cert store.
168
-
- Grant access to the certificate’s private key to Network User.
168
+
- Grant access to the certificate's private key to Network User.
169
169
- Restart the NPS.
170
170
171
171
Unless you want to use your own certificates (instead of the self-signed certificates that the PowerShell script generates), run the PowerShell Script to complete the installation. If you install the extension on multiple servers, each one should have its own certificate.
@@ -247,9 +247,9 @@ You can choose to create this key and set it to FALSE while your users are onboa
247
247
248
248
### NPS extension health check script
249
249
250
-
The following script is available on the TechNet Gallery to perform basic health check steps when troubleshooting the NPS extension.
250
+
The following script is available to perform basic health check steps when troubleshooting the NPS extension.
@@ -332,6 +332,8 @@ Additional troubleshooting guidance and possible solutions can be found in the a
332
332
333
333
## Next steps
334
334
335
+
-[Overview and configuration of Network Policy Server in Windows Server](https://docs.microsoft.com/windows-server/networking/technologies/nps/nps-top)
336
+
335
337
- Configure alternate IDs for login, or set up an exception list for IPs that shouldn't perform two-step verification in [Advanced configuration options for the NPS extension for Multi-Factor Authentication](howto-mfa-nps-extension-advanced.md)
336
338
337
339
- Learn how to integrate [Remote Desktop Gateway](howto-mfa-nps-extension-rdg.md) and [VPN servers](howto-mfa-nps-extension-vpn.md) using the NPS extension
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-password-ban-bad-on-premises-operations.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.reviewer: jsimmons
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# Enable on-premises Azure Active Password Protection
18
+
# Enable on-premises Azure Active Directory Password Protection
19
19
20
20
Users often create passwords that use common local words such as a school, sports team, or famous person. These passwords are easy to guess, and weak against dictionary-based attacks. To enforce strong passwords in your organization, Azure Active Directory (Azure AD) Password Protection provides a global and custom banned password list. A password change request fails if there's a match in these banned password list.
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/terms-of-use.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -274,7 +274,11 @@ If a user is using Windows 10 and Microsoft Edge, they will receive a message si
274
274
275
275
If they are using Chrome, they will be prompted to install the [Windows 10 Accounts extension](https://chrome.google.com/webstore/detail/windows-10-accounts/ppnbnpeolgkicgegkbkbjmhlideopiji).
276
276
277
-
### Join an Android device
277
+
### Register an iOS device
278
+
279
+
If a user is using an iOS device, they will be prompted to install the [Microsoft Authenticator app](https://apps.apple.com/us/app/microsoft-authenticator/id983156458).
280
+
281
+
### Register an Android device
278
282
279
283
If a user is using an Android device, they will be prompted to install the [Microsoft Authenticator app](https://play.google.com/store/apps/details?id=com.azure.authenticator).
0 commit comments