You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Pre-populate user authentication contact information for Azure Active Directory self-service password reset (SSPR)
20
20
21
-
To use Azure Active Directory (Azure AD) self-service password reset (SSPR), authentication contact information for a user must be present. Some organizations have users register their authentication data themselves. Other organizations prefer to synchronize from authentication data that already exists in Active Directory Domain Services (AD DS). This synchronized data is made available to Azure AD and SSPR without requiring user interaction. When users need to change or reset their password, they can do so even if they haven't previously registered their contact information.
21
+
To use Azure Active Directory (Azure AD) self-service password reset (SSPR), authentication information for a user must be present. Most organizations have users register their authentication data themselves while collecting information for MFA. Some organizations prefer to bootstrap this process through synchronization of authentication data that already exists in Active Directory Domain Services (AD DS). This synchronized data is made available to Azure AD and SSPR without requiring user interaction. When users need to change or reset their password, they can do so even if they haven't previously registered their contact information.
22
22
23
23
You can pre-populate authentication contact information if you meet the following requirements:
24
24
@@ -80,13 +80,13 @@ The following fields can be set through PowerShell:
80
80
* Can only be set if you're not synchronizing with an on-premises directory.
81
81
82
82
> [!IMPORTANT]
83
-
> There's a known lack of parity in command features between PowerShell v1 and PowerShell v2. The [Microsoft Graph REST API (beta) for authentication methods](/graph/api/resources/authenticationmethods-overview) is the current engineering focus to provide modern interaction.
83
+
> Azure AD PowerShell is planned for deprecation. You can start using [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) to interact with Azure AD as you would in Azure AD PowerShell, or use the [Microsoft Graph REST API for managing authentication methods](/graph/api/resources/authenticationmethods-overview).
84
84
85
-
### Use PowerShell version 1
85
+
### Use Azure AD PowerShell version 1
86
86
87
87
To get started, [download and install the Azure AD PowerShell module](/previous-versions/azure/jj151815(v=azure.100)#bkmk_installmodule). After it's installed, use the following steps to configure each field.
88
88
89
-
#### Set the authentication data with PowerShell version 1
89
+
#### Set the authentication data with Azure AD PowerShell version 1
To get started, [download and install the Azure AD version 2 PowerShell module](/powershell/module/azuread/).
126
126
127
127
To quickly install from recent versions of PowerShell that support `Install-Module`, run the following commands. The first line checks to see if the module is already installed:
128
128
129
129
```PowerShell
130
-
Get-Module AzureADPreview
131
-
Install-Module AzureADPreview
130
+
Get-Module AzureAD
131
+
Install-Module AzureAD
132
132
Connect-AzureAD
133
133
```
134
134
135
135
After the module is installed, use the following steps to configure each field.
136
136
137
-
#### Set the authentication data with PowerShell version 2
137
+
#### Set the authentication data with Azure AD PowerShell version 2
To get started, [download and install the Microsoft Graph PowerShell module](/powershell/microsoftgraph/overview).
164
+
165
+
To quickly install from recent versions of PowerShell that support `Install-Module`, run the following commands. The first line checks to see if the module is already installed:
166
+
167
+
```PowerShell
168
+
Get-Module Microsoft.Graph
169
+
Install-Module Microsoft.Graph
170
+
Select-MgProfile -Name "beta"
171
+
Connect-MgGraph -Scopes "User.ReadWrite.All"
172
+
```
173
+
174
+
After the module is installed, use the following steps to configure each field.
175
+
176
+
#### Set the authentication data with Microsoft Graph PowerShell
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/faq.yml
+12-2Lines changed: 12 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -189,9 +189,19 @@ sections:
189
189
For information about what licenses your organization needs to use Azure AD B2B, see [External Identities pricing](external-identities-pricing.md).
190
190
191
191
- question: |
192
-
Can B2B collaboration users sign in with their non-UPN email address?
192
+
What happens if I invite a user whose email and UPN don’t match?
193
193
answer: |
194
-
Yes. For more information about email as an alternate login ID for B2B collaboration, see [B2B guest user sign-in with an email address](../authentication/howto-authentication-use-email-signin.md#b2b-guest-user-sign-in-with-an-email-address).
194
+
It depends. By default, Azure AD only allows UPN for login ID. When UPN and email are the same, Azure AD B2B invitations and subsequent sign-ins work as expected. However, issues can arise when a user’s email and UPN don’t match, and the email is used instead of the UPN to sign in.
195
+
When a user is invited with a non-UPN email, they will be able to redeem the invitation if they redeem using the [email invitation link](https://docs.microsoft.com/azure/active-directory/external-identities/redemption-experience#redemption-through-the-invitation-email), but redemptions via a [direct link](https://docs.microsoft.com/azure/active-directory/external-identities/redemption-experience#redemption-through-a-direct-link) will fail. However, even if the user successfully redeems the invitation, subsequent sign-in attempts using the non-UPN email will fail unless the identity provider (either Azure AD or a federated identity provider) is configured to allow email as an alternative login ID.
196
+
This issue can be mitigated by:
197
+
1. [Enabling email as an alternate login ID](https://docs.microsoft.com/azure/active-directory/authentication/howto-authentication-use-email-signin) in the invited/home Azure AD tenant
198
+
2. Enabling the federated identity provider to support email as login ID (if Azure AD is federated to another identity provider) or
199
+
3. Instructing the user to redeem/sign-in using their UPN.
200
+
To avoid this issue entirely, administrators should ensure users’ UPN and email are the same value.
201
+
202
+

203
+
204
+

Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/road-to-the-cloud-posture.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ In enterprise-sized organizations, IAM transformation, or even transformation fr
53
53
[](media/road-to-cloud-posture/road-to-the-cloud-five-states.png#lightbox)
54
54
55
55
>[!NOTE]
56
-
> The states in this diagram represent a logical progression of cloud transformation.
56
+
> The states in this diagram represent a logical progression of cloud transformation. Your ability to move from one state to the next is dependent on the functionality that you have implemented and the capabilities within that functionality to move to the cloud.
57
57
58
58
**State 1 Cloud attached** - In this state, organizations have created an Azure AD tenant to enable user productivity and collaboration tools and the tenant is fully operational. Most companies that use Microsoft products and services in their IT environment are already in or beyond this state. In this state operational costs may be higher because there's an on-premises environment and cloud environment to maintain and make interactive. Also, people must have expertise in both environments to support their users and the organization. In this state:
Copy file name to clipboardExpand all lines: articles/api-management/api-management-access-restriction-policies.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -555,7 +555,7 @@ This policy can be used in the following policy [sections](./api-management-howt
555
555
556
556
## <aname="ValidateJWT"></a> Validate JWT
557
557
558
-
The `validate-jwt` policy enforces existence and validity of a JSON web token (JWT) extracted from either a specified HTTP header or a specified query parameter.
558
+
The `validate-jwt` policy enforces existence and validity of a JSON web token (JWT) extracted from a specified HTTP header, extracted from a specified query parameter, or matching a specific value.
559
559
560
560
> [!IMPORTANT]
561
561
> The `validate-jwt` policy requires that the `exp` registered claim is included in the JWT token, unless `require-expiration-time` attribute is specified and set to `false`.
@@ -569,10 +569,11 @@ The `validate-jwt` policy enforces existence and validity of a JSON web token (J
569
569
570
570
```xml
571
571
<validate-jwt
572
-
header-name="name of http header containing the token (use query-parameter-name attribute if the token is passed in the URL)"
572
+
header-name="name of HTTP header containing the token (alternatively, use query-parameter-name or token-value attribute to specify token)"
573
+
query-parameter-name="name of query parameter used to pass the token (alternative, use header-name or token-value attribute to specify token)"
574
+
token-value="expression returning the token as a string (alternatively, use header-name or query-parameter attribute to specify token)"
573
575
failed-validation-httpcode="http status code to return on failure"
574
576
failed-validation-error-message="error message to return on failure"
575
-
token-value="expression returning JWT token as a string"
576
577
require-expiration-time="true|false"
577
578
require-scheme="scheme"
578
579
require-signed-tokens="true|false"
@@ -724,7 +725,7 @@ This example shows how to use the [Validate JWT](api-management-access-restricti
724
725
| failed-validation-httpcode | HTTP Status code to return if the JWT doesn't pass validation. | No | 401 |
725
726
| header-name | The name of the HTTP header holding the token. | One of `header-name`, `query-parameter-name` or `token-value` must be specified. | N/A |
726
727
| query-parameter-name | The name of the query parameter holding the token. | One of `header-name`, `query-parameter-name` or `token-value` must be specified. | N/A |
727
-
| token-value | Expression returning a string containing JWT token. You must not return `Bearer ` as part of the token value. | One of `header-name`, `query-parameter-name` or `token-value` must be specified. | N/A |
728
+
| token-value | Expression returning a string containing the token. You must not return `Bearer ` as part of the token value. | One of `header-name`, `query-parameter-name` or `token-value` must be specified. | N/A |
728
729
| id | The `id` attribute on the `key` element allows you to specify the string that will be matched against `kid` claim in the token (if present) to find out the appropriate key to use for signature validation. | No | N/A |
729
730
| match | The `match` attribute on the `claim` element specifies whether every claim value in the policy must be present in the token for validation to succeed. Possible values are:<br /><br /> - `all` - every claim value in the policy must be present in the token for validation to succeed.<br /><br /> - `any` - at least one claim value must be present in the token for validation to succeed. | No | all |
730
731
| require-expiration-time | Boolean. Specifies whether an expiration claim is required in the token. | No | true |
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-ssl-policy-overview.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,7 +118,6 @@ Application Gateway supports the following cipher suites from which you can choo
118
118
119
119
- The connections to backend servers are always with minimum protocol TLS v1.0 and up to TLS v1.2. Therefore, only TLS versions 1.0, 1.1 and 1.2 are supported to establish a secured connection with backend servers.
120
120
- As of now, the TLS 1.3 implementation is not enabled with "Zero Round Trip Time (0-RTT)" feature.
121
-
- The Portal support for the new policies and TLS 1.3 is currently unavailable.
122
121
- Application Gateway v2 does not support the following DHE ciphers. These won't be used for the TLS connections with clients even though they are mentioned in the predefined policies. Instead of DHE ciphers, secure and faster ECDHE ciphers are recommended.
0 commit comments