Skip to content

Commit 505d46e

Browse files
authored
Merge pull request #226148 from MicrosoftDocs/main
2/02 PM Publish
2 parents d5279ac + f771bab commit 505d46e

File tree

149 files changed

+1168
-770
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

149 files changed

+1168
-770
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22661,6 +22661,11 @@
2266122661
"redirect_URL": "/azure/route-server/tutorial-protect-route-server-ddos",
2266222662
"redirect_document_id": false
2266322663
},
22664+
{
22665+
"source_path": "articles/external-attack-surface-management/data-connections-overview.md",
22666+
"redirect_URL": "/azure/external-attack-surface-management/index",
22667+
"redirect_document_id": true
22668+
},
2266422669
{
2266522670
"source_path": "articles/virtual-network/nat-gateway/tutorial-protect-nat-gateway.md",
2266622671
"redirect_URL": "/azure/virtual-network/nat-gateway/tutorial-protect-nat-gateway-ddos",

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ sections:
123123
How can I use single-factor certificates to complete MFA?
124124
answer: |
125125
We have support for single factor CBA to get MFA. CBA SF + PSI (passwordless phone sign in) and CBA SF + FIDO2 are the two supported combinations to get MFA using single factor certificates.
126-
[MFA with single factor certificates](../authentication/concept-certificate-based-authentication-technical-deep-dive.md#single-factor-certificate-based-authentication)
126+
[MFA with single factor certificates](../authentication/concept-certificate-based-authentication-technical-deep-dive.md#mfa-authentication-flow-using-single-factor-certificates-and-passwordless-sign-in)
127127
128128
- question: |
129129
Will the changes to the Authentication methods policy take effect immediately?

articles/active-directory/authentication/concept-certificate-based-authentication-migration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,9 @@ To configure Staged Rollout, follow these steps:
3939

4040
For more information, see [Staged Rollout](../hybrid/how-to-connect-staged-rollout.md).
4141

42+
>[!NOTE]
43+
> When Staged rollout is enabled for a user, the user is considered a managed user and all authentication will happen at Azure AD. For a federated Tenant, if CBA is enabled on Staged Rollout, password authentication only works if PHS is enabled too otherwise password authentication will fail.
44+
4245
## Use Azure AD connect to update certificateUserIds attribute
4346

4447
An AD FS admin can use **Synchronization Rules Editor** to create rules to sync the values of attributes from AD FS to Azure AD user objects. For more information, see [Sync rules for certificateUserIds](concept-certificate-based-authentication-certificateuserids.md#update-certificate-user-ids-using-azure-ad-connect).

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,10 @@ Now we'll walk through each step:
7474

7575
## MFA with Single-factor certificate-based authentication
7676

77-
Azure AD CBA supports second factors to meet MFA requirements with single-factor certificates. Users can use either passwordless sign-in or FIDO2 security keys as second factors when the first factor is single-factor CBA. Users need to register passwordless sign-in or FIDO2 in advance to signing in with Azure AD CBA.
77+
Azure AD CBA supports second factors to meet MFA requirements with single-factor certificates. Users can use either passwordless sign-in or FIDO2 security keys as second factors when the first factor is single-factor CBA. Users need to have another way to get MFA and register passwordless sign-in or FIDO2 in advance to signing in with Azure AD CBA.
78+
79+
>[!IMPORTANT]
80+
>A user will be considered MFA capable when a user is in scope for Certificate-based authentication auth method. This means user will not be able to use proof up as part of their authentication to registerd other available methods. More info on [Azure AD MFA](../authentication/concept-mfa-howitworks.md)
7881
7982
**Steps to set up passwordless phone signin(PSI) with CBA**
8083

articles/active-directory/develop/console-quickstart-portal-nodejs.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,7 @@ ms.custom: mode-api
2525
2626
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
2727
> # Quickstart: Acquire a token and call Microsoft Graph API from a Node.js console app using app's identity
28-
>
29-
> [!div renderon="portal" class="sxs-lookup"]
28+
>
3029
> In this quickstart, you download and run a code sample that demonstrates how a Node.js console application can get an access token using the app's identity to call the Microsoft Graph API and display a [list of users](/graph/api/user-list) in the directory. The code sample demonstrates how an unattended job or Windows service can run with an application identity, instead of a user's identity.
3130
>
3231
> This quickstart uses the [Microsoft Authentication Library for Node.js (MSAL Node)](https://github.com/AzureAD/microsoft-authentication-library-for-js/tree/dev/lib/msal-node) with the [client credentials grant](v2-oauth2-client-creds-grant-flow.md).

articles/active-directory/develop/daemon-quickstart-portal-python.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ ms.custom: aaddev, identityplatformtop40, devx-track-python, "scenarios:getting-
2525
> We apologize for the inconvenience and appreciate your patience while we work to get this resolved.
2626
2727
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
28+
> # Quickstart: Acquire a token and call Microsoft Graph API from a Python console app using app's identity
2829
>
29-
> [!div renderon="portal" class="sxs-lookup"]
3030
> In this quickstart, you download and run a code sample that demonstrates how a Python application can get an access token using the app's identity to call the Microsoft Graph API and display a [list of users](/graph/api/user-list) in the directory. The code sample demonstrates how an unattended job or Windows service can run with an application identity, instead of a user's identity.
3131
>
3232
> ## Prerequisites

articles/active-directory/develop/web-app-quickstart-portal-java.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.custom: aaddev, "scenarios:getting-started", "languages:Java", devx-track-jav
2222
>
2323
> We apologize for the inconvenience and appreciate your patience while we work to get this resolved.
2424
25-
> > [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
25+
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
2626
> # Quickstart: Add sign-in with Microsoft to a Java web app
2727
>
2828
> In this quickstart, you download and run a code sample that demonstrates how a Java web application can sign in users and call the Microsoft Graph API. Users from any Azure Active Directory (Azure AD) organization can sign in to the application.
@@ -187,4 +187,4 @@ ms.custom: aaddev, "scenarios:getting-started", "languages:Java", devx-track-jav
187187
> For a more in-depth discussion of building web apps that sign in users on the Microsoft identity platform, see the multipart scenario series:
188188
>
189189
> > [!div class="nextstepaction"]
190-
> > [Scenario: Web app that signs in users](scenario-web-app-sign-user-overview.md?tabs=java)
190+
> > [Scenario: Web app that signs in users](scenario-web-app-sign-user-overview.md?tabs=java)

0 commit comments

Comments
 (0)