Skip to content

Commit 46ba48c

Browse files
authored
Merge pull request #248585 from MicrosoftDocs/main
8/17/2023 AM Publish
2 parents e3573f9 + e9ff86d commit 46ba48c

File tree

71 files changed

+1263
-533
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

71 files changed

+1263
-533
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24142,10 +24142,29 @@
2414224142
"source_path": "articles/azure-cache-for-redis/cache-how-to-functions.md",
2414324143
"redirect_url": "/azure/azure-functions/functions-bindings-cache",
2414424144
"redirect_document_id": false
24145+
},
24146+
{
24147+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-configure-authentication.md",
24148+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-single-page-app-vanillajs-configure-authentication",
24149+
"redirect_document_id": false
24150+
},
24151+
{
24152+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-prepare-app.md",
24153+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-single-page-app-vanillajs-prepare-app",
24154+
"redirect_document_id": false
24155+
},
24156+
{
24157+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-prepare-tenant.md",
24158+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-single-page-app-vanillajs-prepare-tenant",
24159+
"redirect_document_id": false
24160+
},
24161+
{
24162+
"source_path_from_root": "/articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-sign-in-sign-out.md",
24163+
"redirect_url": "/azure/active-directory/external-identities/customers/tutorial-single-page-app-vanillajs-sign-in-sign-out",
24164+
"redirect_document_id": false
2414524165
}
2414624166

2414724167

24148-
2414924168

2415024169
]
2415124170
}

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/22/2023
9+
ms.date: 08/16/2023
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -58,6 +58,7 @@ The following table lists each setting that can be set to Microsoft managed and
5858
| [Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
5959
| [System-preferred MFA](concept-system-preferred-multifactor-authentication.md) | Enabled |
6060
| [Authenticator Lite](how-to-mfa-authenticator-lite.md) | Enabled |
61+
| [Report suspicious activity](howto-mfa-mfasettings.md#report-suspicious-activity) | Disabled |
6162

6263
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/). For example, see our blog post [It's Time to Hang Up on Phone Transports for Authentication](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752) for more information about the need to move away from using SMS and voice calls, which led to default enablement for the registration campaign to help users to set up Authenticator for modern authentication.
6364

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/17/2023
9+
ms.date: 08/16/2023
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: amycolannino
14-
ms.reviewer: michmcla
14+
ms.reviewer: jupetter
1515

1616
ms.collection: M365-identity-device-management
1717
ms.custom: contperf-fy20q4
@@ -87,11 +87,16 @@ To unblock a user, complete the following steps:
8787

8888
Users who report an MFA prompt as suspicious are set to **High User Risk**. Administrators can use risk-based policies to limit access for these users, or enable self-service password reset (SSPR) for users to remediate problems on their own. If you previously used the **Fraud Alert** automatic blocking feature and don't have an Azure AD P2 license for risk-based policies, you can use risk detection events to identify and disable impacted users and automatically prevent their sign-in. For more information about using risk-based policies, see [Risk-based access policies](../identity-protection/concept-identity-protection-policies.md).
8989

90-
To enable **Report suspicious activity** from the Authentication Methods Settings:
90+
To enable **Report suspicious activity** from the Authentication methods **Settings**:
9191

9292
1. In the Azure portal, click **Azure Active Directory** > **Security** > **Authentication Methods** > **Settings**.
93-
1. Set **Report suspicious activity** to **Enabled**.
93+
1. Set **Report suspicious activity** to **Enabled**. The feature remains disabled if you choose **Microsoft managed**. For more information about Microsoft managed values, see [Protecting authentication methods in Azure Active Directory](concept-authentication-default-enablement.md).
9494
1. Select **All users** or a specific group.
95+
1. Select a **Reporting code**.
96+
1. Click **Save**.
97+
98+
>[!NOTE]
99+
>If you enable **Report suspicious activity** and specify a custom voice reporting value while the tenant still has **Fraud Alert** enabled in parallel with a custom voice reporting number configured, the **Report suspicious activity** value will be used instead of **Fraud Alert**.
95100
96101
### View suspicious activity events
97102

articles/active-directory/develop/howto-create-self-signed-certificate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ To customize the start and expiry date and other properties of the certificate,
4646

4747
Use the certificate you create using this method to authenticate from an application running from your machine. For example, authenticate from Windows PowerShell.
4848

49-
In an elevated PowerShell prompt, run the following command and leave the PowerShell console session open. Replace `{certificateName}` with the name that you wish to give to your certificate.
49+
In a PowerShell prompt, run the following command and leave the PowerShell console session open. Replace `{certificateName}` with the name that you wish to give to your certificate.
5050

5151
```powershell
5252
$certname = "{certificateName}" ## Replace {certificateName}

articles/active-directory/develop/identity-videos.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -175,12 +175,12 @@ ___
175175

176176

177177
<!-- IMAGES -->
178-
[auth-fund-01-img]: ./media/identity-videos/aad-auth-fund-01.jpg
179-
[auth-fund-02-img]: ./media/identity-videos/aad-auth-fund-02.jpg
180-
[auth-fund-03-img]: ./media/identity-videos/aad-auth-fund-03.jpg
181-
[auth-fund-04-img]: ./media/identity-videos/aad-auth-fund-04.jpg
182-
[auth-fund-05-img]: ./media/identity-videos/aad-auth-fund-05.jpg
183-
[auth-fund-06-img]: ./media/identity-videos/aad-auth-fund-06.jpg
178+
[auth-fund-01-img]: ./media/identity-videos/auth-fund-01.jpg
179+
[auth-fund-02-img]: ./media/identity-videos/auth-fund-02.jpg
180+
[auth-fund-03-img]: ./media/identity-videos/auth-fund-03.jpg
181+
[auth-fund-04-img]: ./media/identity-videos/auth-fund-04.jpg
182+
[auth-fund-05-img]: ./media/identity-videos/auth-fund-05.jpg
183+
[auth-fund-06-img]: ./media/identity-videos/auth-fund-06.jpg
184184

185185
<!-- VIDEOS -->
186186
[auth-fund-01-vid]: https://www.youtube.com/watch?v=fbSVgC8nGz4&list=PLLasX02E8BPD5vC2XHS_oHaMVmaeHHPLy&index=1

0 commit comments

Comments
 (0)