You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/application-provisioning-quarantine-status.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -75,16 +75,16 @@ A job can go into quarantine regardless of failure counts for issues such as adm
75
75
76
76
The logic documented here may be different for certain connectors to ensure best customer experience, but we generally have the below retry cycles after a failure:
77
77
78
-
After the first failure, the first retry happens within the next 2 hours (usually in the next sync cycle).
79
-
- The second retry happens 6 hours after the first failure.
80
-
- The third retry happens 12 hours after the first failure.
81
-
- The fourth retry happens 24 hours after the first failure.
82
-
- The fifth retry happens 48 hours after the first failure.
83
-
- The sixth retry happens 72 hours after the first failure.
84
-
- The seventh retry happens 96 hours after the first failure.
85
-
- The eighth retry happens 120 hours after the first failure.
86
-
87
-
This cycle is repeated every 24 hours until the 30th day when retries are stopped and the job is disabled.
78
+
After the failure, the first retry will happen in 6 hours.
79
+
- The second retry happens 12 hours after the first failure.
80
+
- The third retry happens 24 hours after the first failure.
81
+
- The fourth retry happens 48 hours after the first failure.
82
+
- The fifth retry happens 96 hours after the first failure.
83
+
- The sixth retry happens 192 hours after the first failure.
84
+
- The seventh retry happens 384 hours after the first failure.
85
+
- The eighth retry happens 768 hours after the first failure.
86
+
87
+
The retries are stopped after the 8th retry and the escrow entry is removed. The job will continue unless it hits the escrow thresholds from the section above
Copy file name to clipboardExpand all lines: articles/active-directory/develop/msal-net-aad-b2c-considerations.md
+15-17Lines changed: 15 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: conceptual
11
11
ms.workload: identity
12
-
ms.date: 05/07/2020
12
+
ms.date: 02/21/2023
13
13
ms.author: henrymbugua
14
14
ms.reviewer: saeeda, jeferrie
15
15
ms.custom: "devx-track-csharp, aaddev"
@@ -29,9 +29,9 @@ This article applies to MSAL.NET 3.x. For MSAL.NET 2.x, see [Azure AD B2C specif
29
29
30
30
The authority format for Azure AD B2C is: `https://{azureADB2CHostname}/tfp/{tenant}/{policyName}`
31
31
32
-
-`azureADB2CHostname` - The name of the Azure AD B2C tenant plus the host. For example, *contosob2c.b2clogin.com*.
33
-
-`tenant` - The domain name or the directory (tenant) ID of the Azure AD B2C tenant. For example, *contosob2c.onmicrosoft.com* or a GUID, respectively.
34
-
-`policyName` - The name of the user flow or custom policy to apply. For example, a sign-up/sign-in policy like *b2c_1_susi*.
32
+
-`azureADB2CHostname` - The name of the Azure AD B2C tenant plus the host. For example, _contosob2c.b2clogin.com_.
33
+
-`tenant` - The domain name or the directory (tenant) ID of the Azure AD B2C tenant. For example, _contosob2c.onmicrosoft.com_ or a GUID, respectively.
34
+
-`policyName` - The name of the user flow or custom policy to apply. For example, a sign-up/sign-in policy like _b2c_1_susi_.
35
35
36
36
For more information about Azure AD B2C authorities, see [Set redirect URLs to b2clogin.com](../../active-directory-b2c/b2clogin.md).
For more information on the ROPC flow, see [Sign in with resource owner password credentials grant](v2-oauth-ropc.md).
118
118
119
-
The ROPC flow is **not recommended** because asking a user for their password in your application is not secure. For more information about this problem, see [What’s the solution to the growing problem of passwords?](https://news.microsoft.com/features/whats-solution-growing-problem-passwords-says-microsoft/).
119
+
The ROPC flow is **not recommended** because asking a user for their password in your application isn't secure. For more information about this problem, see [What’s the solution to the growing problem of passwords?](https://news.microsoft.com/features/whats-solution-growing-problem-passwords-says-microsoft/).
120
120
121
121
By using username/password in an ROPC flow, you sacrifice several things:
122
122
123
123
- Core tenets of modern identity: The password can be fished or replayed because the shared secret can be intercepted. By definition, ROPC is incompatible with passwordless flows.
124
-
- Users who need to do MFA won't be able to sign in (as there is no interaction).
124
+
- Users who use multi-factor authentication (MFA) won't be able to sign in as there's no interaction.
125
125
- Users won't be able to use single sign-on (SSO).
This`AcquireTokenByUsernamePassword` method takes the following parameters:
140
+
The`AcquireTokenByUsernamePassword` method takes the following parameters:
141
141
142
-
- The *scopes* for which to obtain an access token.
143
-
- A *username*.
144
-
- A SecureString *password* for the user.
142
+
- The _scopes_ for which to obtain an access token.
143
+
- A _username_.
144
+
- A SecureString _password_ for the user.
145
145
146
146
### Limitations of the ROPC flow
147
147
148
148
The ROPC flow **only works for local accounts**, where your users have registered with Azure AD B2C using an email address or username. This flow doesn't work when federating to an external identity provider supported by Azure AD B2C (Facebook, Google, etc.).
149
149
150
150
## Google auth and embedded webview
151
151
152
-
If you're using Google as an identity provider, we recommend you use the system browser as Google doesn't allow [authentication from embedded webviews](https://developers.googleblog.com/2016/08/modernizing-oauth-interactions-in-native-apps.html). Currently, `login.microsoftonline.com` is a trusted authority with Google and will work with embedded webview. However, `b2clogin.com` is not a trusted authority with Google, so users will not be able to authenticate.
153
-
154
-
We'll provide an update to this [issue](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues/688) if things change.
152
+
If you're using Google as an identity provider, we recommend you use the system browser as Google doesn't allow [authentication from embedded webviews](https://developers.googleblog.com/2016/08/modernizing-oauth-interactions-in-native-apps.html). Currently, `login.microsoftonline.com` is a trusted authority with Google and will work with embedded webview. However, `b2clogin.com` isn't a trusted authority with Google, so users won't be able to authenticate.
155
153
156
154
## Token caching in MSAL.NET
157
155
@@ -186,6 +184,6 @@ For more information about specifying which claims are returned by your user flo
186
184
187
185
More details about acquiring tokens interactively with MSAL.NET for Azure AD B2C applications are provided in the following sample.
188
186
189
-
| Sample | Platform | Description|
190
-
|------ | -------- | -----------|
191
-
|[active-directory-b2c-xamarin-native](https://github.com/Azure-Samples/active-directory-b2c-xamarin-native)| Xamarin iOS, Xamarin Android, UWP | A Xamarin Forms app that uses MSAL.NET to authenticate users via Azure AD B2C and then access a web API with the tokens returned.|
|[active-directory-b2c-xamarin-native](https://github.com/Azure-Samples/active-directory-b2c-xamarin-native)| Xamarin iOS, Xamarin Android, UWP | A Xamarin Forms app that uses MSAL.NET to authenticate users via Azure AD B2C and then access a web API with the tokens returned.|
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/overview-recommendations.md
+9-10Lines changed: 9 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.topic: overview
9
9
ms.tgt_pltfrm: na
10
10
ms.workload: identity
11
11
ms.subservice: report-monitor
12
-
ms.date: 02/16/2023
12
+
ms.date: 02/24/2023
13
13
ms.author: sarahlipsey
14
14
ms.reviewer: hafowler
15
15
ms.collection: M365-identity-device-management
@@ -48,9 +48,9 @@ Each recommendation contains a description, a summary of the value of addressing
48
48
49
49
Each recommendation provides the same set of details that explain what the recommendation is, why it's important, and how to fix it.
50
50
51
-
The **Status** of a recommendation can be updated manually or automatically. If all resources are addressed according to the action plan, the status will automatically change to *Completed* the next time the recommendations service runs. The recommendation service runs every 24-48 hours, depending on the recommendation.
51
+
The **Status** of a recommendation can be updated manually or automatically by the system. If all resources are addressed according to the action plan, the status automatically changes to *Completed* the next time the recommendations service runs. The recommendation service runs every 24-48 hours, depending on the recommendation.
52
52
53
-

53
+

54
54
55
55
The **Priority** of a recommendation could be low, medium, or high. These values are determined by several factors, such as security implications, health concerns, or potential breaking changes.
56
56
@@ -118,17 +118,16 @@ The recommendations listed in the following table are available to all Azure AD
118
118
119
119
1. The recommendation service automatically marks the recommendation as complete, but if you need to manually change the status of a recommendation, select **Mark as** from the top of the page and select a status.
120
120
121
-

121
+

122
122
123
-
- Mark a recommendation as **Completed** if all impacted resources have been addressed.
124
-
- Active resources may still appear in the list of resources for manually completed recommendations. If the resource is completed, the service will update the status the next time the service runs.
125
-
- If the service identifies an active resource for a manually completed recommendation the next time the service runs, the recommendation will automatically change back to **Active**.
126
-
- Completing a recommendation is the only action collected in the audit log. To view these logs, go to **Azure AD** > **Audit logs** and filter the service to "Azure AD recommendations."
127
123
- Mark a recommendation as **Dismissed** if you think the recommendation is irrelevant or the data is wrong.
128
-
- Azure AD will ask for a reason why you dismissed the recommendation so we can improve the service.
124
+
- Azure AD asks for a reason why you dismissed the recommendation so we can improve the service.
129
125
- Mark a recommendation as **Postponed** if you want to address the recommendation at a later time.
130
-
- The recommendation will become**Active** when the selected date occurs.
126
+
- The recommendation becomes**Active** when the selected date occurs.
131
127
- You can reactivate a completed or postponed recommendation to keep it top of mind and reassess the resources.
128
+
- Recommendations change to **Completed** if all impacted resources have been addressed.
129
+
- If the service identifies an active resource for a completed recommendation the next time the service runs, the recommendation will automatically change back to **Active**.
130
+
- Completing a recommendation is the only action collected in the audit log. To view these logs, go to **Azure AD** > **Audit logs** and filter the service to "Azure AD recommendations."
132
131
133
132
Continue to monitor the recommendations in your tenant for changes.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/recommendation-migrate-to-authenticator.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,18 +8,18 @@ ms.service: active-directory
8
8
ms.topic: reference
9
9
ms.workload: identity
10
10
ms.subservice: report-monitor
11
-
ms.date: 02/07/2023
11
+
ms.date: 02/24/2023
12
12
ms.author: sarahlipsey
13
13
ms.reviewer: hafowler
14
14
15
15
ms.collection: M365-identity-device-management
16
16
---
17
17
18
-
# Azure AD recommendation: Migrate to Microsoft Authenticator
18
+
# Azure AD recommendation: Migrate to Microsoft Authenticator (preview)
19
19
20
20
[Azure AD recommendations](overview-recommendations.md) is a feature that provides you with personalized insights and actionable guidance to align your tenant with recommended best practices.
21
21
22
-
This article covers the recommendation to migrate users to the Microsoft Authenticator app. This recommendation is called `useAuthenticatorApp` in the recommendations API in Microsoft Graph.
22
+
This article covers the recommendation to migrate users to the Microsoft Authenticator app, which is currently a preview recommendation. This recommendation is called `useAuthenticatorApp` in the recommendations API in Microsoft Graph.
0 commit comments