You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/active-directory-certificate-based-authentication-get-started.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ This topic:
33
33
34
34
To configure certificate-based authentication, the following statements must be true:
35
35
36
-
- Certificate-based authentication (CBA) is only supported for Federated environments for browser applications or native clients using modern authentication (ADAL). The one exception is Exchange Active Sync (EAS) for Exchange Online (EXO), which can be used for federated and managed accounts.
36
+
- Certificate-based authentication (CBA) is only supported for Federated environments for browser applications, native clients using modern authentication (ADAL), or MSAL libraries. The one exception is Exchange Active Sync (EAS) for Exchange Online (EXO), which can be used for federated and managed accounts.
37
37
- The root certificate authority and any intermediate certificate authorities must be configured in Azure Active Directory.
38
38
- Each certificate authority must have a certificate revocation list (CRL) that can be referenced via an internet-facing URL.
39
39
- You must have at least one certificate authority configured in Azure Active Directory. You can find related steps in the [Configure the certificate authorities](#step-2-configure-the-certificate-authorities) section.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-userstates.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,11 +38,14 @@ Enabled by Azure AD Identity Protection - This method uses the Azure AD Identity
38
38
39
39
User accounts in Azure Multi-Factor Authentication have the following three distinct states:
40
40
41
+
> [!IMPORTANT]
42
+
> Enabling Azure MFA through a Conditional Access policy will not change the state of the user. Do not be alarmed users appear disabled. Conditional Access does not change the state. **Organizations should not enable or enforce users if they are utilizing Conditional Access policies.**
43
+
41
44
| Status | Description | Non-browser apps affected | Browser apps affected | Modern authentication affected |
42
-
|:---:|:---:|:---:|:--:|:--:|
43
-
| Disabled |The default state for a new user not enrolled in Azure MFA. |No |No |No |
44
-
| Enabled |The user has been enrolled in Azure MFA, but has not registered. They receive a prompt to register the next time they sign in. |No. They continue to work until the registration process is completed. | Yes. After the session expires, Azure MFA registration is required.| Yes. After the access token expires, Azure MFA registration is required. |
45
-
| Enforced |The user has been enrolled and has completed the registration process for Azure MFA. |Yes. Apps require app passwords. |Yes. Azure MFA is required at login. | Yes. Azure MFA is required at login. |
45
+
|:---:|---|:---:|:--:|:--:|
46
+
| Disabled |The default state for a new user not enrolled in Azure MFA. |No |No |No |
47
+
| Enabled |The user has been enrolled in Azure MFA, but has not registered. They receive a prompt to register the next time they sign in. |No. They continue to work until the registration process is completed. | Yes. After the session expires, Azure MFA registration is required.| Yes. After the access token expires, Azure MFA registration is required. |
48
+
| Enforced |The user has been enrolled and has completed the registration process for Azure MFA. |Yes. Apps require app passwords. |Yes. Azure MFA is required at login. | Yes. Azure MFA is required at login. |
46
49
47
50
A user's state reflects whether an admin has enrolled them in Azure MFA, and whether they completed the registration process.
|Admin enabling the consent request workflow|Access Reviews|UserManagement|Create governance policy template |App context|Currently you cannot find the user context|
120
-
|Admin disablingtheconsentrequest workflow|Access Reviews|UserManagement|Delete governance policy template |App context|Currently you cannot find the user context|
121
-
|Admin updating the consent workflow configurations|Access Reviews|UserManagement|Update governance policy template |App context|Currently you cannot find the user context|
122
-
|End user creating anadmin consentrequestfor anapp|Access Reviews|Policy |Createrequest|App context|Currently you cannot find the user context|
123
-
|Reviewers approving anadmin consentrequest|Access Reviews|UserManagement|Approve all requests in business flow |App context|Currentlyyou cannot find the user context or the app ID that was granted admin consent.|
124
-
|Reviewers denying an admin consentrequest|Access Reviews|UserManagement|Approve all requests in business flow |App context|Currentlyyou cannot find the user context of the actor that denied an admin consent request |
119
+
|Admin enabling the consent request workflow |Access Reviews |UserManagement |Create governance policy template |App context |Currently you cannot find the user context|
120
+
|Admin disablingtheconsentrequest workflow |Access Reviews |UserManagement |Delete governance policy template |App context |Currently you cannot find the user context|
121
+
|Admin updating the consent workflow configurations |Access Reviews |UserManagement |Update governance policy template |App context |Currently you cannot find the user context|
122
+
|End user creating anadmin consentrequestfor anapp |Access Reviews |Policy |Createrequest |App context |Currently you cannot find the user context|
123
+
|Reviewers approving anadmin consentrequest |Access Reviews |UserManagement |Approve all requests in business flow |App context |Currentlyyou cannot find the user context or the app ID that was granted admin consent.|
124
+
|Reviewers denying an admin consentrequest |Access Reviews |UserManagement |Approve all requests in business flow |App context |Currentlyyou cannot find the user context of the actor that denied an admin consent request |
The following is a listing of cmdlets in the internal `Orchestrator.AssetManagement.Cmdlets` module that is imported into every Automation Account. These cmdlets are accessible in your runbooks and DSC configurations and allow you to interact with your assets within your Automation Account. Additionally, the internal cmdlets allow you to retrieve secrets from encrypted **Variable** values, **Credentials**, and encrypted **Connection** fields. The Azure PowerShell cmdlets are not able to retrieve these secrets. These cmdlets do not require you to implicitly connect to Azure when using them, such as using a Run As Account to authenticate to Azure.
75
75
76
+
>[!NOTE]
77
+
>These internal cmdlets are not available on a Hybrid Runbook Worker, they are only accessible from runbooks running in Azure. Use the corresponding [AzureRM.Automation](https://docs.microsoft.com/powershell/module/AzureRM.Automation/?view=azurermps-6.13.0) or [Az modules](../az-modules.md) for runbooks running directly on the computer or against resources in your environment.
0 commit comments