Skip to content

Commit 3f1a0aa

Browse files
authored
Merge pull request #227855 from MicrosoftDocs/main
2/17/2023 PM Publish
2 parents 929e93b + 349c8f6 commit 3f1a0aa

File tree

140 files changed

+1780
-718
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

140 files changed

+1780
-718
lines changed

articles/active-directory-b2c/identity-provider-generic-saml-options.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 01/13/2022
12+
ms.date: 02/17/2023
1313
ms.custom: project-no-code
1414
ms.author: godonnell
1515
ms.subservice: B2C
@@ -294,7 +294,7 @@ The following SAML authorization request contains the authentication context cla
294294

295295
## Include custom data in the authorization request
296296

297-
You can optionally include protocol message extension elements that are agreed to by both Azure AD BC and your identity provider. The extension is presented in XML format. You include extension elements by adding XML data inside the CDATA element `<![CDATA[Your Custom XML]]>`. Check your identity provider’s documentation to see if the extensions element is supported.
297+
You can optionally include protocol message extension elements that are agreed to by both Azure AD B2C and your identity provider. The extension is presented in XML format. You include extension elements by adding XML data inside the CDATA element `<![CDATA[Your Custom XML]]>`. Check your identity provider’s documentation to see if the extensions element is supported.
298298

299299
The following example illustrates the use of extension data:
300300

21.4 KB
Loading
6.2 KB
Loading
47.2 KB
Loading
56.9 KB
Loading
43.3 KB
Loading
58 KB
Loading
Lines changed: 143 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,143 @@
1+
---
2+
title: 'Provisioning insights workbook'
3+
description: This article describes the Azure Monitor workbook for provisioning.
4+
services: active-directory
5+
author: billmath
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.topic: conceptual
9+
ms.workload: identity
10+
ms.date: 02/17/2023
11+
ms.subservice: hybrid
12+
ms.author: billmath
13+
ms.collection: M365-identity-device-management
14+
---
15+
16+
17+
18+
# Provisioning insights workbook
19+
The Provisioning workbook provides a flexible canvas for data analysis. This workbook brings together all of the provisioning logs from various sources and allows you to gain insight, in a single area. The workbook allows you to create rich visual reports within the Azure portal. To learn more, see Azure Monitor Workbooks overview.
20+
21+
This workbook is intended for Hybrid Identity Admins who use provisioning to sync users from various data sources to various data repositories. It allows admins to gain insights into sync status and details.
22+
23+
This workbook:
24+
25+
- Provides a synchronization summary of users and groups synchronized from all of you provisioning sources to targets
26+
- Provides and aggregated and detailed view of information captured by the provisioning logs.
27+
- Allows you to customize the data to tailor it to your specific needs
28+
29+
30+
31+
## Enabling provisioning logs
32+
33+
You should already be familiar with Azure monitoring and Log Analytics. If not, jump over to learn about them and then come back to learn about application provisioning logs. To learn more about Azure monitoring, see [Azure Monitor overview](../../azure-monitor/overview.md). To learn more about Azure Monitor logs and Log Analytics, see [Overview of log queries in Azure Monitor](../../azure-monitor/logs/log-query-overview.md) and [Provisioning Logs for troubleshooting cloud sync](../cloud-sync/how-to-troubleshoot.md).
34+
35+
## Source and Target
36+
At the top of the workbook, using the drop-down, specify the source and target identities.
37+
38+
Theses fields are the source and target of identities. The rest of the filters that appear are based on the selection of source and target.
39+
You can scope your search so that it is more granular using the additional fields. Use the table below as a reference for queries.
40+
41+
For example, if you wanted to see data from your cloud sync workflow, your source would be Active Directory and your target would be Azure AD.
42+
43+
44+
>[!NOTE]
45+
>Source and target are required. If you do not select a source and target, you won't see any data.
46+
47+
:::image type="content" source="media/provisioning-workbook/fields-1.png" alt-text="Screenshot of fields." lightbox="media/provisioning-workbook/fields-1.png":::
48+
49+
50+
|Field|Description|
51+
|-----|-----|
52+
|Source|The provisioning source repository|
53+
|Target|The provisioning target repository|
54+
|Time Range|The range of provisioning information you want to view. This can be anywhere from 4 hours to 90 days. You can also set a custom value.|
55+
|Status|View the provisioning status such as Success or Skipped.|
56+
|Action|View the provisioning actions taken such as Create or Delete.|
57+
|App Name|Allows you to filter by the application name. In the case of Active Directory, you can filter by domains.|
58+
|Job Id|Allows you to target specific Job Ids.|
59+
|Sync type|Filter by type of synchronization such as object or password.|
60+
61+
>[!NOTE]
62+
> All of the charts and grids in Sync Summary, Sync Details, and Sync Details by grid, change based on source,target and the parameter selections.
63+
64+
65+
## Sync Summary
66+
The sync summary section provides a summary of your organizations synchronization activities. These activities include:
67+
- Total synced objects by type
68+
- Provisioning events by action
69+
- Provisioning events by status
70+
- Unique sync count by status
71+
- Provisioning success rate
72+
- Top provisioning errors
73+
74+
75+
:::image type="content" source="media/provisioning-workbook/sync-summary-1.png" alt-text="Screenshot of the synchronization summary." lightbox="media/provisioning-workbook/sync-summary-1.png":::
76+
77+
## Sync details
78+
The sync details tab allows you to drill into the synchronization data and get more information. This information includes:
79+
- Objects sync by status
80+
- Objects synced by action
81+
- Sync log details
82+
83+
>[!NOTE]
84+
>The grid is filterable on any of the above filters but you can also click the tiles under under **Objects synced by Status** and **Action**.
85+
86+
:::image type="content" source="media/provisioning-workbook/sync-details-1.png" alt-text="Screenshot of the synchronization details." lightbox="media/provisioning-workbook/sync-details-1.png":::
87+
88+
You can further drill in to the sync log details for additional information.
89+
90+
91+
92+
>[!NOTE]
93+
>Clicking on the Source ID it will dive deeper and provide more information on the synchronized object.
94+
95+
## Sync details by cycle
96+
The sync details by cycle tab allow you to get more granular with the synchronization data. This information includes:
97+
- Objects sync by status
98+
- Objects synced by action
99+
- Sync log details
100+
101+
:::image type="content" source="media/provisioning-workbook/sync-details-2.png" alt-text="Screenshot of the synchronization details by cycle tab." lightbox="media/provisioning-workbook/sync-details-2.png":::
102+
103+
You can further drill in to the sync log details for additional information.
104+
105+
>[!NOTE]
106+
>The grid is filterable on any of the above filters but you can also click the tiles under under **Objects synced by Status** and **Action**.
107+
108+
## Single user view
109+
The user provisioning view tab allows you to get synchronization data on individual users.
110+
111+
>[!NOTE]
112+
>This section does not involve using source and target.
113+
114+
In this section, you enter a time range and select a specific user to see which applications a user has been provisioned or deprovisioned in.
115+
116+
Once you select a time range, it will filter for users that have events in that time range.
117+
118+
119+
To target a specific user, you can add one of the following parameters, for that user.
120+
- UPN
121+
- UserID
122+
123+
:::image type="content" source="media/provisioning-workbook/single-user-1.png" alt-text="Screenshot of the single user view." lightbox="media/provisioning-workbook/single-user-1.png":::
124+
125+
## Details
126+
By clicking on the Source ID in the **Sync details** or the **Sync details by cycle** views, you can see additional information on the object synchronized.
127+
128+
:::image type="content" source="media/provisioning-workbook/details-1.png" alt-text="Screenshot of the details of an object." lightbox="media/provisioning-workbook/details-1.png":::
129+
130+
## Custom queries
131+
132+
You can create custom queries and show the data on Azure dashboards. To learn how, see [Create and share dashboards of Log Analytics data](../../azure-monitor/logs/get-started-queries.md). Also, be sure to check out [Overview of log queries in Azure Monitor](../../azure-monitor/logs/log-query-overview.md).
133+
134+
## Custom alerts
135+
136+
Azure Monitor lets you configure custom alerts so that you can get notified about key events related to Provisioning. For example, you might want to receive an alert on spikes in failures. Or perhaps spikes in disables or deletes. Another example of where you might want to be alerted is a lack of any provisioning, which indicates something is wrong.
137+
138+
To learn more about alerts, see [Azure Monitor Log Alerts](../../azure-monitor/alerts/alerts-log.md).
139+
140+
## Next steps
141+
142+
- [What is provisioning?](../cloud-sync/what-is-provisioning.md)
143+
- [Error codes](../cloud-sync/reference-error-codes.md)

articles/active-directory/app-provisioning/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,8 @@ items:
7575
href: export-import-provisioning-configuration.md
7676
- name: Provisioning reports
7777
href: ../reports-monitoring/concept-provisioning-logs.md?context=%2fazure%2factive-directory%2fapp-provisioning%2fcontext%2fapp-provisioning-context
78+
- name: Provisioning insights workbook
79+
href: provisioning-workbook.md
7880
- name: Workday provisioning scenarios
7981
items:
8082
- name: Retrieve pronoun information

articles/active-directory/authentication/howto-password-smart-lockout.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -28,14 +28,14 @@ Smart lockout tracks the last three bad password hashes to avoid incrementing th
2828
> [!NOTE]
2929
> Hash tracking functionality isn't available for customers with pass-through authentication enabled as authentication happens on-premises not in the cloud.
3030
31-
Federated deployments that use AD FS 2016 and AD FS 2019 can enable similar benefits using [AD FS Extranet Lockout and Extranet Smart Lockout](/windows-server/identity/ad-fs/operations/configure-ad-fs-extranet-smart-lockout-protection).
31+
Federated deployments that use AD FS 2016 and AD FS 2019 can enable similar benefits using [AD FS Extranet Lockout and Extranet Smart Lockout](/windows-server/identity/ad-fs/operations/configure-ad-fs-extranet-smart-lockout-protection). It is recommended to move to [managed authentication](https://www.microsoft.com/security/business/identity-access/upgrade-adfs).
3232

3333
Smart lockout is always on, for all Azure AD customers, with these default settings that offer the right mix of security and usability. Customization of the smart lockout settings, with values specific to your organization, requires Azure AD Premium P1 or higher licenses for your users.
3434

3535
Using smart lockout doesn't guarantee that a genuine user is never locked out. When smart lockout locks a user account, we try our best to not lock out the genuine user. The lockout service attempts to ensure that bad actors can't gain access to a genuine user account. The following considerations apply:
3636

37-
* Lockout state across Azure AD data centers are synchronized. The total number of failed sign-in attempts allowed before an account is locked out will also match the configured lockout threshold though there still may be some slight variance before a lockout. Once an account is locked out, they will be locked out everywhere across all Azure AD data centers.
38-
* Smart Lockout uses familiar location vs unfamiliar location to differentiate between a bad actor and the genuine user. Unfamiliar and familiar locations both have separate lockout counters.
37+
* Lockout state across Azure AD data centers is synchronized. However, the total number of failed sign-in attempts allowed before an account is locked out will have slight variance from the configured lockout threshold. Once an account is locked out, it will be locked out everywhere across all Azure AD data centers.
38+
* Smart Lockout uses familiar location vs unfamiliar location to differentiate between a bad actor and the genuine user. Both unfamiliar and familiar locations have separate lockout counters.
3939

4040
Smart lockout can be integrated with hybrid deployments that use password hash sync or pass-through authentication to protect on-premises Active Directory Domain Services (AD DS) accounts from being locked out by attackers. By setting smart lockout policies in Azure AD appropriately, attacks can be filtered out before they reach on-premises AD DS.
4141

@@ -66,7 +66,7 @@ Based on your organizational requirements, you can customize the Azure AD smart
6666

6767
To check or modify the smart lockout values for your organization, complete the following steps:
6868

69-
1. Sign in to the [Azure portal](https://portal.azure.com).
69+
1. Sign in to the [Entra portal](https://entra.microsoft.com/#home).
7070
1. Search for and select *Azure Active Directory*, then select **Security** > **Authentication methods** > **Password protection**.
7171
1. Set the **Lockout threshold**, based on how many failed sign-ins are allowed on an account before its first lockout.
7272

@@ -87,7 +87,7 @@ When the smart lockout threshold is triggered, you will get the following messag
8787

8888
*Your account is temporarily locked to prevent unauthorized use. Try again later, and if you still have trouble, contact your admin.*
8989

90-
When you test smart lockout, your sign-in requests might be handled by different datacenters due to the geo-distributed and load-balanced nature of the Azure AD authentication service. In that scenario, because each Azure AD datacenter tracks lockout independently, it might take more than your defined lockout threshold number of attempts to cause a lockout. A user has a maximum of (*threshold_limit * datacenter_count*) number of bad attempts before being completely locked out.
90+
When you test smart lockout, your sign-in requests might be handled by different datacenters due to the geo-distributed and load-balanced nature of the Azure AD authentication service.
9191

9292
Smart lockout tracks the last three bad password hashes to avoid incrementing the lockout counter for the same password. If someone enters the same bad password multiple times, this behavior won't cause the account to lock out.
9393

@@ -97,6 +97,6 @@ In addition to Smart lockout, Azure AD also protects against attacks by analyzin
9797

9898
## Next steps
9999

100-
To customize the experience further, you can [configure custom banned passwords for Azure AD password protection](tutorial-configure-custom-password-protection.md).
100+
- To customize the experience further, you can [configure custom banned passwords for Azure AD password protection](tutorial-configure-custom-password-protection.md).
101101

102-
To help users reset or change their password from a web browser, you can [configure Azure AD self-service password reset](tutorial-enable-sspr.md).
102+
- To help users reset or change their password from a web browser, you can [configure Azure AD self-service password reset](tutorial-enable-sspr.md).

0 commit comments

Comments
 (0)