Skip to content

Commit 61f87d2

Browse files
authored
Merge pull request #179130 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents 69db082 + 0226e79 commit 61f87d2

File tree

156 files changed

+2011
-1562
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

156 files changed

+2011
-1562
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -418,6 +418,11 @@
418418
"redirect_url": "/articles/frontdoor/front-door-ddos",
419419
"redirect_document_id": false
420420
},
421+
{
422+
"source_path_from_root": "/articles/frontdoor/standard-premium/geo-filtering.md",
423+
"redirect_url": "/articles/frontdoor/front-door-geo-filtering",
424+
"redirect_document_id": false
425+
},
421426
{
422427
"source_path_from_root": "/articles/azure-sql/database/doc-changes-updates-release-notes.md",
423428
"redirect_url": "/azure/azure-sql/database/doc-changes-updates-release-notes-whats-new",

articles/active-directory-b2c/add-api-connector.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory-b2c
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: how-to
8-
ms.date: 08/24/2021
8+
ms.date: 11/09/2021
99

1010
ms.author: kengaderdus
1111
author: kengaderdus
@@ -72,6 +72,7 @@ Content-type: application/json
7272
}
7373
],
7474
"displayName": "John Smith",
75+
"objectId": "11111111-0000-0000-0000-000000000000"
7576
"givenName":"John",
7677
"surname":"Smith",
7778
"jobTitle":"Supplier",
@@ -142,6 +143,7 @@ Content-type: application/json
142143
}
143144
],
144145
"displayName": "John Smith",
146+
"objectId": "11111111-0000-0000-0000-000000000000",
145147
"givenName":"John",
146148
"lastName":"Smith",
147149
"step": "PostFederationSignup",
@@ -195,6 +197,7 @@ Content-type: application/json
195197
}
196198
],
197199
"displayName": "John Smith",
200+
"objectId": "11111111-0000-0000-0000-000000000000",
198201
"givenName":"John",
199202
"surname":"Smith",
200203
"jobTitle":"Supplier",

articles/active-directory-b2c/trustframeworkpolicy.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 03/15/2021
11+
ms.date: 11/09/2021
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
@@ -66,6 +66,7 @@ The **TrustFrameworkPolicy** element contains the following elements:
6666
| [BuildingBlocks](buildingblocks.md) | 0:1 | The building blocks of your policy. |
6767
| [ClaimsProviders](claimsproviders.md) | 0:1 | A collection of claims providers. |
6868
| [UserJourneys](userjourneys.md) | 0:1 | A collection of user journeys. |
69+
| [SubJourneys](subjourneys.md) | 0:1 | A collection of sub journeys. |
6970
| [RelyingParty](relyingparty.md) | 0:1 | A definition of a relying party policy. |
7071

7172
To inherit a policy from another policy, a **BasePolicy** element must be declared under the **TrustFrameworkPolicy** element of the policy file. The **BasePolicy** element is a reference to the base policy from which this policy is derived.

articles/active-directory/external-identities/b2b-tutorial-require-mfa.md

Lines changed: 37 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: tutorial
9-
ms.date: 06/22/2021
9+
ms.date: 11/08/2021
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -44,24 +44,24 @@ If you don’t have an Azure subscription, create a [free account](https://azure
4444

4545
To complete the scenario in this tutorial, you need:
4646

47-
- **Access to Azure AD Premium edition**, which includes Conditional Access policy capabilities. To enforce MFA, you need to create an Azure AD Conditional Access policy. Note that MFA policies are always enforced at your organization, regardless of whether the partner has MFA capabilities. If you set up MFA for your organization, you’ll need to make sure you have sufficient Azure AD Premium licenses for your guest users.
47+
- **Access to Azure AD Premium edition**, which includes Conditional Access policy capabilities. To enforce MFA, you need to create an Azure AD Conditional Access policy. Note that MFA policies are always enforced at your organization, regardless of whether the partner has MFA capabilities.
4848
- **A valid external email account** that you can add to your tenant directory as a guest user and use to sign in. If you don't know how to create a guest account, see [Add a B2B guest user in the Azure portal](add-users-administrator.md).
4949

5050
## Create a test guest user in Azure AD
5151

5252
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Azure AD administrator.
53-
2. In the left pane, select **Azure Active Directory**.
54-
3. Under **Manage**, select **Users**.
55-
4. Select **New guest user**.
53+
1. In the Azure portal, select **Azure Active Directory**.
54+
1. In the left menu, under **Manage**, select **Users**.
55+
1. Select **New guest user**.
5656

5757
![Screenshot showing where to select the New guest user option](media/tutorial-mfa/tutorial-mfa-user-3.png)
5858

59-
5. Under **User name**, enter the email address of the external user. Optionally, include a welcome message.
59+
1. Under **Identity**, enter the email address of the external user. Optionally, include a name and welcome message.
6060

6161
![Screenshot showing where to enter the guest invitation message](media/tutorial-mfa/tutorial-mfa-user-4.png)
6262

63-
6. Select **Invite** to automatically send the invitation to the guest user. A **Successfully invited user** message appears.
64-
7. After you send the invitation, the user account is automatically added to the directory as a guest.
63+
1. Select **Invite** to automatically send the invitation to the guest user. A **Successfully invited user** message appears.
64+
1. After you send the invitation, the user account is automatically added to the directory as a guest.
6565

6666
## Test the sign-in experience before MFA setup
6767

@@ -72,76 +72,76 @@ To complete the scenario in this tutorial, you need:
7272
## Create a Conditional Access policy that requires MFA
7373

7474
1. Sign in to your [Azure portal](https://portal.azure.com/) as a security administrator or a Conditional Access administrator.
75-
2. In the Azure portal, select **Azure Active Directory**.
76-
3. On the **Azure Active Directory** page, in the **Security** section, select **Conditional Access**.
77-
4. On the **Conditional Access** page, in the toolbar on the top, select **New policy**.
78-
5. On the **New** page, in the **Name** textbox, type **Require MFA for B2B portal access**.
79-
6. In the **Assignments** section, select **Users and groups**.
80-
7. On the **Users and groups** page, choose **Select users and groups**, and then select **All guest and external users**.
75+
1. In the Azure portal, select **Azure Active Directory**.
76+
1. In the left menu, under **Manage**, select **Security**.
77+
1. Under **Protect**, select **Conditional Access**.
78+
1. On the **Conditional Access** page, in the toolbar on the top, select **New policy**.
79+
1. On the **New** page, in the **Name** textbox, type **Require MFA for B2B portal access**.
80+
1. In the **Assignments** section, choose the link under **Users and groups**.
81+
1. On the **Users and groups** page, choose **Select users and groups**, and then choose **All guest and external users**.
8182

8283
![Screenshot showing selecting all guest users](media/tutorial-mfa/tutorial-mfa-policy-6.png)
83-
9. Select **Done**.
84-
10. On the **New** page, in the **Assignments** section, select **Cloud apps**.
85-
11. On the **Cloud apps** page, choose **Select apps**, and then choose **Select**.
84+
1. In the **Assignments** section, choose the link under **Cloud apps or actions**.
85+
1. Choose **Select apps**, and then choose the link under **Select**.
8686

8787
![Screenshot showing the Cloud apps page and the Select option](media/tutorial-mfa/tutorial-mfa-policy-10.png)
8888

89-
12. On the **Select** page, choose **Microsoft Azure Management**, and then choose **Select**.
89+
1. On the **Select** page, choose **Microsoft Azure Management**, and then choose **Select**.
9090

9191
![Screenshot that highlights the Microsoft Azure Management option.](media/tutorial-mfa/tutorial-mfa-policy-11.png)
9292

93-
13. On the **Cloud apps** page, select **Done**.
94-
14. On the **New** page, in the **Access controls** section, select **Grant**.
95-
15. On the **Grant** page, choose **Grant access**, select the **Require multi-factor authentication** check box, and then choose **Select**.
93+
1. On the **New** page, in the **Access controls** section, choose the link under **Grant**.
94+
1. On the **Grant** page, choose **Grant access**, select the **Require multi-factor authentication** check box, and then choose **Select**.
9695

9796
![Screenshot showing the Require multi-factor authentication option](media/tutorial-mfa/tutorial-mfa-policy-13.png)
9897

99-
16. Under **Enable policy**, select **On**.
98+
1. Under **Enable policy**, select **On**.
10099

101100
![Screenshot showing the Enable policy option set to On](media/tutorial-mfa/tutorial-mfa-policy-14.png)
102101

103-
17. Select **Create**.
102+
1. Select **Create**.
104103

105104
## Use the What If option to simulate sign-in
106105

107-
1. On the **Conditional Access - Policies** page, select **What If**.
106+
1. On the **Conditional Access | Policies** page, select **What If**.
108107

109108
![Screenshot that highlights where to select the What if option on the Conditional Access - Policies page.](media/tutorial-mfa/tutorial-mfa-whatif-1.png)
110109

111-
2. Select **User**, choose your test guest user, and then choose **Select**.
110+
1. Select the link under **User**.
111+
1. In the search box, type the name of your test guest user. Choose the user in the search results, and then choose **Select**.
112112

113113
![Screenshot showing a guest user selected](media/tutorial-mfa/tutorial-mfa-whatif-2.png)
114114

115-
3. Select **Cloud apps**.
116-
4. On the **Cloud apps** page, choose **Select apps** and then click **Select**. In the applications list, select **Microsoft Azure Management**, and then click **Select**.
115+
1. Select the link under **Cloud apps, actions, or authentication content**.
116+
. Choose **Select apps**, and then choose the link under **Select**.
117117

118118
![Screenshot showing the Microsoft Azure Management app selected](media/tutorial-mfa/tutorial-mfa-whatif-3.png)
119119

120-
5. On the **Cloud apps** page, select **Done**.
121-
6. Select **What If**, and verify that your new policy appears under **Evaluation results** on the **Policies that will apply** tab.
120+
1. On the **Cloud apps** page, in the applications list, choose **Microsoft Azure Management**, and then choose **Select**.
121+
1. Choose **What If**, and verify that your new policy appears under **Evaluation results** on the **Policies that will apply** tab.
122122

123123
![Screenshot showing where to select the What if option](media/tutorial-mfa/tutorial-mfa-whatif-4.png)
124124

125125
## Test your Conditional Access policy
126126

127127
1. Use your test user name and password to sign in to your [Azure portal](https://portal.azure.com/).
128-
2. You should see a request for additional authentication methods. Note that it could take some time for the policy to take effect.
128+
1. You should see a request for additional authentication methods. Note that it could take some time for the policy to take effect.
129129

130130
![Screenshot showing the More information required message](media/tutorial-mfa/mfa-required.png)
131131

132-
3. Sign out.
132+
1. Sign out.
133133

134134
## Clean up resources
135135

136136
When no longer needed, remove the test user and the test Conditional Access policy.
137137

138138
1. Sign in to the [Azure portal](https://portal.azure.com/) as an Azure AD administrator.
139-
2. In the left pane, select **Azure Active Directory**.
140-
3. Under **Manage**, select **Users**.
141-
4. Select the test user, and then select **Delete user**.
142-
5. In the left pane, select **Azure Active Directory**.
143-
6. Under **Security**, select **Conditional Access**.
144-
7. In the **Policy Name** list, select the context menu (…) for your test policy, and then select **Delete**. Select **Yes** to confirm.
139+
1. In the left pane, select **Azure Active Directory**.
140+
1. Under **Manage**, select **Users**.
141+
1. Select the test user, and then select **Delete user**.
142+
1. In the left pane, select **Azure Active Directory**.
143+
1. Under **Security**, select **Conditional Access**.
144+
1. In the **Policy Name** list, select the context menu (…) for your test policy, and then select **Delete**. Select **Yes** to confirm.
145145

146146
## Next steps
147147

7.24 KB
Loading
-5.68 KB
Loading
5.12 KB
Loading
1.87 KB
Loading
3.91 KB
Loading
12.3 KB
Loading

0 commit comments

Comments
 (0)