Skip to content

Commit 3fb5e77

Browse files
authored
Merge pull request #127821 from MicrosoftDocs/master
8/31 AM Publish
2 parents d7352c0 + 0dc74f5 commit 3fb5e77

File tree

179 files changed

+1470
-873
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

179 files changed

+1470
-873
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29378,6 +29378,21 @@
2937829378
"redirect_url": "/azure/security-center/security-center-virtual-machine-protection",
2937929379
"redirect_document_id": false
2938029380
},
29381+
{
29382+
"source_path": "articles/security-center/security-center-vulnerability-assessment-recommendations.md",
29383+
"redirect_url": "/azure/security-center/deploy-vulnerability-assessment-vm",
29384+
"redirect_document_id": false
29385+
},
29386+
{
29387+
"source_path": "articles/security-center/built-in-vulnerability-assessment.md",
29388+
"redirect_url": "/azure/security-center/deploy-vulnerability-assessment-vm",
29389+
"redirect_document_id": false
29390+
},
29391+
{
29392+
"source_path": "articles/security-center/partner-vulnerability-assessment.md",
29393+
"redirect_url": "/azure/security-center/deploy-vulnerability-assessment-vm",
29394+
"redirect_document_id": false
29395+
},
2938129396
{
2938229397
"source_path": "articles/security-center/security-center-secure-score.md",
2938329398
"redirect_url": "/azure/security-center/secure-score-security-controls",

articles/active-directory-b2c/billing.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ ms.workload: identity
1111
ms.date: 10/25/2019
1212
ms.author: mimart
1313
ms.subservice: B2C
14+
ms.custom: fasttrack-edit
1415
---
1516

1617
# Billing model for Azure Active Directory B2C
@@ -128,12 +129,25 @@ The management of Azure AD B2C using role-based access control is not affected b
128129

129130
## Change the Azure AD B2C tenant billing subscription
130131

131-
Azure AD B2C tenants can be moved to another subscription if the source and destination subscriptions exist within the same Azure Active Directory tenant.
132+
### Move using Azure Resource Manager
133+
134+
Azure AD B2C tenants can be moved to another subscription using Azure Resource Manager if the source and destination subscriptions exist within the same Azure Active Directory tenant.
132135

133136
To learn how to move Azure resources like your Azure AD B2C tenant to another subscription, see [Move resources to new resource group or subscription](../azure-resource-manager/management/move-resource-group-and-subscription.md).
134137

135138
Before you initiate the move, be sure to read the entire article to fully understand the limitations and requirements for such a move. In addition to instructions for moving resources, it includes critical information like a pre-move checklist and how to validate the move operation.
136139

140+
### Move by un-linking and re-linking
141+
142+
If the source and destination subscriptions are associated with different Azure Active Directory tenants, you can't perform the move via Azure Resource Manager as explained above. However, you can still achieve the same end result by un-linking the Azure AD B2C tenant from the source subscription and re-linking it to the destination subscription. This method is safe because the only object you delete is the *billing link*, not the Azure AD B2C tenant itself. None of the users, apps, user flows, etc. will be affected.
143+
144+
1. In the Azure AD B2C directory itself, [invite a guest user](user-overview.md#guest-user) from the destination Azure AD tenant (the one that the destination Azure subscription is linked to) and ensure this user has the **Global administrator** role in Azure AD B2C.
145+
1. Navigate to the *Azure resource* representing Azure AD B2C in your source Azure subscription as explained in the [Manage your Azure AD B2C tenant resources](#manage-your-azure-ad-b2c-tenant-resources) section above. Don't switch to the actual Azure AD B2C tenant.
146+
1. Click the **Delete** button on the **Overview** page. This does *not* delete the related Azure AD B2C tenant's users or applications. It merely removes the billing link from the source subscription.
147+
1. Sign in to the Azure portal with the user account that was added as an administrator in Azure AD B2C in step 1. Then navigate to the destination Azure subscription, which is linked to the destination Azure Active Directory tenant.
148+
1. Re-establish the billing link in the destination subscription by following the [Create the link](#create-the-link) procedure above.
149+
1. Your Azure AD B2C resource has now moved to the destination Azure subscription (linked to the target Azure Active Directory) and will be billed through this subscription going forward.
150+
137151
## Next steps
138152

139153
For the latest pricing information, see [Azure Active Directory B2C pricing](https://azure.microsoft.com/pricing/details/active-directory-b2c/).

articles/active-directory/authentication/concepts-azure-multi-factor-authentication-prompts-session-lifetime.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/22/2020
9+
ms.date: 08/31/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -18,6 +18,10 @@ ms.collection: M365-identity-device-management
1818

1919
Azure Active Directory (Azure AD) has multiple settings that determine how often users need to reauthenticate. This reauthentication could be with a first factor such as password, FIDO, or passwordless Microsoft Authenticator, or to perform multi-factor authentication (MFA). You can configure these reauthentication settings as needed for your own environment and the user experience you want.
2020

21+
The Azure AD default configuration for user sign-in frequency is a rolling window of 90 days. Asking users for credentials often seems like a sensible thing to do, but it can backfire. If users are trained to enter their credentials without thinking, they can unintentionally supply them to a malicious credential prompt.
22+
23+
It might sound alarming to not ask for a user to sign back in, though any violation of IT policies revokes the session. Some examples include a password change, an incompliant device, or an account disable operation. You can also explicitly [revoke users' sessions using PowerShell](/powershell/module/azuread/revoke-azureaduserallrefreshtoken).
24+
2125
This article details recommended configurations and how different settings work and interact with each other.
2226

2327
## Recommended settings
@@ -31,6 +35,7 @@ To give your users the right balance of security and ease of use by asking them
3135
* If you have Office 365 apps licenses or the free Azure AD tier:
3236
* Enable single sign-on (SSO) across applications using [managed devices](../devices/overview.md) or [Seamless SSO](../hybrid/how-to-connect-sso.md).
3337
* Keep the *Remain signed-in* option enabled and guide your users to accept it.
38+
* For mobile devices scenarios, make sure your users use the Microsoft Authenticator app. This app is used as a broker to other Azure AD federated apps, and reduces authentication prompts on the device.
3439

3540
Our research shows that these settings are right for most tenants. Some combinations of these settings, such as *Remember MFA* and *Remain singed-in*, can result in prompts for your users to authenticate too often. Regular reauthentication prompts are bad for user productivity and can make them more vulnerable to attacks.
3641

@@ -67,11 +72,11 @@ For more information on configuring the option to let users remain signed-in, se
6772

6873
### Remember Multi-Factor Authentication
6974

70-
This setting lets you configure values between 1-60 days and sets a persistent cookie on the browser when a user selects the **Don't ask again for X days** option at sign-in.
75+
This setting lets you configure values between 1-365 days and sets a persistent cookie on the browser when a user selects the **Don't ask again for X days** option at sign-in.
7176

7277
![Screenshot of example prompt to approve a sign-in request](./media/concepts-azure-multi-factor-authentication-prompts-session-lifetime/approve-sign-in-request.png)
7378

74-
While this setting reduces the number of authentications on web apps, it increases the number of authentications for modern authentication clients, such as Office clients. These clients normally prompt only after password reset or inactivity of 90 days. However, the maximum value of *Remember MFA* is 60 days. When used in combined with **Remain signed-in** or Conditional Access policies, it may increase the number of authentication requests.
79+
While this setting reduces the number of authentications on web apps, it increases the number of authentications for modern authentication clients, such as Office clients. These clients normally prompt only after password reset or inactivity of 90 days. However, setting this value to less than 90 days shortens the default MFA prompts for Office clients, and increases reauthentication frequency. When used in combined with **Remain signed-in** or Conditional Access policies, it may increase the number of authentication requests.
7580

7681
If you use *Remember MFA* and have Azure AD Premium 1 licenses, consider migrating these settings to Conditional Access Sign-in Frequency. Otherwise, consider using *Keep me signed in?* instead.
7782

0 commit comments

Comments
 (0)