You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md
+6-9Lines changed: 6 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 02/22/2022
9
+
ms.date: 08/22/2022
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -101,13 +101,11 @@ Run the following steps in each domain and forest in your organization that cont
101
101
1. Run the following PowerShell commands to create a new Azure AD Kerberos Server object both in your on-premises Active Directory domain and in your Azure Active Directory tenant.
102
102
103
103
### Example 1 prompt for all credentials
104
-
> [!NOTE]
105
-
> Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
106
104
107
105
```powershell
108
106
# Specify the on-premises Active Directory domain. A new Azure AD
109
107
# Kerberos Server object will be created in this Active Directory domain.
110
-
$domain = "contoso.corp.com"
108
+
$domain = $env:USERDNSDOMAIN
111
109
112
110
# Enter an Azure Active Directory global administrator username and password.
113
111
$cloudCred = Get-Credential -Message 'An Active Directory user who is a member of the Global Administrators group for Azure AD.'
@@ -127,7 +125,7 @@ Run the following steps in each domain and forest in your organization that cont
127
125
```powershell
128
126
# Specify the on-premises Active Directory domain. A new Azure AD
129
127
# Kerberos Server object will be created in this Active Directory domain.
130
-
$domain = "contoso.corp.com"
128
+
$domain = $env:USERDNSDOMAIN
131
129
132
130
# Enter an Azure Active Directory global administrator username and password.
133
131
$cloudCred = Get-Credential
@@ -147,7 +145,7 @@ Run the following steps in each domain and forest in your organization that cont
147
145
```powershell
148
146
# Specify the on-premises Active Directory domain. A new Azure AD
149
147
# Kerberos Server object will be created in this Active Directory domain.
150
-
$domain = "contoso.corp.com"
148
+
$domain = $env:USERDNSDOMAIN
151
149
152
150
# Enter a UPN of an Azure Active Directory global administrator
@@ -164,13 +162,12 @@ Run the following steps in each domain and forest in your organization that cont
164
162
### Example 4 prompt for cloud credentials using modern authentication
165
163
> [!NOTE]
166
164
> If you are working on a domain-joined machine with an account that has domain administrator privileges and your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator. And you can skip the "-DomainCredential" parameter.
167
-
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
168
-
> - Replace `[email protected]` in the following example with the UPN of a global administrator.
165
+
> - Replace `[email protected]` in the following example with the UPN of a global administrator.
169
166
170
167
```powershell
171
168
# Specify the on-premises Active Directory domain. A new Azure AD
172
169
# Kerberos Server object will be created in this Active Directory domain.
173
-
$domain = "contoso.corp.com"
170
+
$domain = $env:USERDNSDOMAIN
174
171
175
172
# Enter a UPN of an Azure Active Directory global administrator
Identity Protection detects compromised credentials for Azure AD users. If your credential is detected as compromised, it means that someone else may have your password and be using it illegitimately. To prevent further risk to your account, it is important to securely reset your password so that the bad actor can no longer use your compromised password. Identity Protection marks accounts that may be compromised as "at risk."
20
+
Identity Protection detects compromised credentials for Azure AD users. If your credential is detected as compromised, it means that someone else may have your password and be using it illegitimately. To prevent further risk to your account, it's important to securely reset your password so that the bad actor can no longer use your compromised password. Identity Protection marks accounts that may be compromised as "at risk."
21
21
22
-
You can use your organizational credentials to sign-in to another organization as a guest. This process is referred to [business-to-business or B2B collaboration](../external-identities/what-is-b2b.md). Organizations can configure policies to block users from signing-in if their credentials are considered [at risk](concept-identity-protection-risks.md). If your account is at risk and you are blocked from signing-in to another organization as a guest, you may be able to self-remediate your account using the following steps. If your organization has not enabled self-service password reset, your administrator will need to manually remediate your account.
22
+
You can use your organizational credentials to sign-in to another organization as a guest. This process is referred to [business-to-business or B2B collaboration](../external-identities/what-is-b2b.md). Organizations can configure policies to block users from signing-in if their credentials are considered [at risk](concept-identity-protection-risks.md). If your account is at risk and you're blocked from signing-in to another organization as a guest, you may be able to self-remediate your account using the following steps. If your organization hasn't enabled self-service password reset, your administrator will need to manually remediate your account.
23
23
24
24
## How to unblock your account
25
25
26
-
If you are attempting to sign-in to another organization as a guest and are blocked due to risk, you will see the following block message: "Your account is blocked. We've detected suspicious activity on your account."
26
+
If you're attempting to sign-in to another organization as a guest and are blocked due to risk, you'll see the following block message: "Your account is blocked. We've detected suspicious activity on your account."
27
27
28
28

29
29
30
30
If your organization enables it, you can use self-service password reset unblock your account and get your credentials back to a safe state.
31
-
1. Go to the [Password reset portal](https://passwordreset.microsoftonline.com/) and initiate the password reset. If self-service password reset is not enabled for your account and you cannot proceed, reach out to your IT administrator with the information [below](#how-to-remediate-a-users-risk-as-an-administrator).
32
-
2. If self-service password reset is enabled for your account, you will be prompted to verify your identity using security methods prior to changing your password. For assistance, see the [Reset your work or school password](https://support.microsoft.com/account-billing/reset-your-work-or-school-password-using-security-info-23dde81f-08bb-4776-ba72-e6b72b9dda9e) article.
31
+
1. Go to the [Password reset portal](https://passwordreset.microsoftonline.com/) and initiate the password reset. If self-service password reset isn't enabled for your account and you can't proceed, reach out to your IT administrator with the information [below](#how-to-remediate-a-users-risk-as-an-administrator).
32
+
2. If self-service password reset is enabled for your account, you'll be prompted to verify your identity using security methods prior to changing your password. For assistance, see the [Reset your work or school password](https://support.microsoft.com/account-billing/reset-your-work-or-school-password-using-security-info-23dde81f-08bb-4776-ba72-e6b72b9dda9e) article.
33
33
3. Once you have successfully and securely reset your password, your user risk will be remediated. You can now try again to sign-in as a guest user.
34
34
35
-
If after resetting your password you are still blocked as a guest due to risk, reach out to your organization's IT administrator.
35
+
If after resetting your password you're still blocked as a guest due to risk, reach out to your organization's IT administrator.
36
36
37
37
## How to remediate a user's risk as an administrator
38
38
39
-
Identity Protection automatically detects risky users for Azure AD tenants. If you have not previously checked the Identity Protection reports, there may be a large number of users with risk. Since resource tenants can apply user risk policies to guest users, your users can be blocked due to risk even if they were previously unaware of their risky state. If your user reports they have been blocked as a guest user in another tenant due to risk, it is important to remediate the user to protect their account and enable collaboration.
39
+
Identity Protection automatically detects risky users for Azure AD tenants. If you haven't previously checked the Identity Protection reports, there may be a large number of users with risk. Since resource tenants can apply user risk policies to guest users, your users can be blocked due to risk even if they were previously unaware of their risky state. If your user reports they've been blocked as a guest user in another tenant due to risk, it's important to remediate the user to protect their account and enable collaboration.
40
40
41
41
### Reset the user's password
42
42
43
-
From the [Risky users report](https://portal.azure.com/#blade/Microsoft_AAD_IAM/SecurityMenuBlade/RiskyUsers) in the Azure AD Security menu, search for the impacted user using the 'User' filter. Select the impacted user in the report and click "Reset password" in the top toolbar. The user will be assigned a temporary password that must be changed on the next signin. This process will remediate their user risk and bring their credentials back to a safe state.
43
+
From the [Risky users report](https://portal.azure.com/#blade/Microsoft_AAD_IAM/SecurityMenuBlade/RiskyUsers) in the Azure AD Security menu, search for the impacted user using the 'User' filter. Select the impacted user in the report and select "Reset password" in the top toolbar. The user will be assigned a temporary password that must be changed on the next sign-in. This process will remediate their user risk and bring their credentials back to a safe state.
44
44
45
45
### Manually dismiss user's risk
46
46
47
-
If password reset is not an option for you from the Azure AD portal, you can choose to manually dismiss user risk. Dismissing user risk does not have any impact on the user's existing password, but this process will change the user's Risk State from At Risk to Dismissed. It is important that you change the user's password using whatever means are available to you in order to bring the identity back to a safe state.
47
+
If password reset isn't an option for you from the Azure AD portal, you can choose to manually dismiss user risk. Dismissing user risk doesn't have any impact on the user's existing password, but this process will change the user's Risk State from At Risk to Dismissed. It's important that you change the user's password using whatever means are available to you in order to bring the identity back to a safe state.
48
48
49
-
To dismiss user risk, go to the [Risky users report](https://portal.azure.com/#blade/Microsoft_AAD_IAM/SecurityMenuBlade/RiskyUsers) in the Azure AD Security menu. Search for the impacted user using the 'User' filter and click on the user. Click on "dismiss user risk" option from the top toolbar. This action may take a few minutes to complete and update the user risk state in the report.
49
+
To dismiss user risk, go to the [Risky users report](https://portal.azure.com/#blade/Microsoft_AAD_IAM/SecurityMenuBlade/RiskyUsers) in the Azure AD Security menu. Search for the impacted user using the 'User' filter and select the user. Select the "dismiss user risk" option from the top toolbar. This action may take a few minutes to complete and update the user risk state in the report.
50
50
51
51
To learn more about Identity Protection, see [What is Identity Protection](overview-identity-protection.md).
52
52
53
53
## How does Identity Protection work for B2B users?
54
54
55
55
The user risk for B2B collaboration users is evaluated at their home directory. The real-time sign-in risk for these users is evaluated at the resource directory when they try to access the resource. With Azure AD B2B collaboration, organizations can enforce risk-based policies for B2B users using Identity Protection. These policies be configured in two ways:
56
56
57
-
- Administrators can configure the built-in Identity Protection risk-based policies, that apply to all apps, that include guest users.
58
-
- Administrators can configure their Conditional Access policies, using sign-in risk as a condition, that includes guest users.
57
+
- Administrators can configure the built-in Identity Protection risk-based policies, that apply to all apps, and include guest users.
58
+
- Administrators can configure their Conditional Access policies, using sign-in risk as a condition, and includes guest users.
59
59
60
60
## Limitations of Identity Protection for B2B collaboration users
61
61
62
-
There are limitations in the implementation of Identity Protection for B2B collaboration users in a resource directory due to their identity existing in their home directory. The main limitations are as follows:
62
+
There are limitations in the implementation of Identity Protection for B2B collaboration users in a resource directory, due to their identity existing in their home directory. The main limitations are as follows:
63
63
64
64
- If a guest user triggers the Identity Protection user risk policy to force password reset, **they will be blocked**. This block is due to the inability to reset passwords in the resource directory.
65
65
-**Guest users do not appear in the risky users report**. This limitation is due to the risk evaluation occurring in the B2B user's home directory.
66
66
- Administrators **cannot dismiss or remediate a risky B2B collaboration user** in their resource directory. This limitation is due to administrators in the resource directory not having access to the B2B user's home directory.
67
67
68
68
### Why can't I remediate risky B2B collaboration users in my directory?
69
69
70
-
The risk evaluation and remediation for B2B users occurs in their home directory. Due to this fact, the guest users do not appear in the risky users report in the resource directory and admins in the resource directory cannot force a secure password reset for these users.
70
+
The risk evaluation and remediation for B2B users occurs in their home directory. Due to this fact, the guest users don't appear in the risky users report in the resource directory and admins in the resource directory can't force a secure password reset for these users.
71
71
72
72
### What do I do if a B2B collaboration user was blocked due to a risk-based policy in my organization?
73
73
74
-
If a risky B2B user in your directory is blocked by your risk-based policy, the user will need to remediate that risk in their home directory. Users can remediate their risk by performing a secure password reset in their home directory [as outlined above](#how-to-unblock-your-account). If they do not have self-service password reset enabled in their home directory, they will need to contact their own organization's IT Staff to have an administrator manually dismiss their risk or reset their password.
74
+
If a risky B2B user in your directory is blocked by your risk-based policy, the user will need to remediate that risk in their home directory. Users can remediate their risk by performing a secure password reset in their home directory [as outlined above](#how-to-unblock-your-account). If they don't have self-service password reset enabled in their home directory, they'll need to contact their own organization's IT Staff to have an administrator manually dismiss their risk or reset their password.
75
75
76
76
### How do I prevent B2B collaboration users from being impacted by risk-based policies?
Copy file name to clipboardExpand all lines: articles/active-directory/identity-protection/concept-identity-protection-policies.md
+12-11Lines changed: 12 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: identity-protection
8
8
ms.topic: conceptual
9
-
ms.date: 05/20/2020
9
+
ms.date: 08/22/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -23,18 +23,22 @@ Azure Active Directory Identity Protection includes three default policies that
23
23
24
24
## Azure AD MFA registration policy
25
25
26
-
Identity Protection can help organizations roll out Azure AD Multi-Factor Authentication (MFA) using a Conditional Access policy requiring registration at sign-in. Enabling this policy is a great way to ensure new users in your organization have registered for MFA on their first day. Multi-factor authentication is one of the self-remediation methods for risk events within Identity Protection. Self-remediation allows your users to take action on their own to reduce helpdesk call volume.
26
+
Identity Protection can help organizations roll out Azure AD Multifactor Authentication (MFA) using a Conditional Access policy requiring registration at sign-in. Enabling this policy is a great way to ensure new users in your organization have registered for MFA on their first day. Multifactor authentication is one of the self-remediation methods for risk events within Identity Protection. Self-remediation allows your users to take action on their own to reduce helpdesk call volume.
27
27
28
-
More information about Azure AD Multi-Factor Authentication can be found in the article, [How it works: Azure AD Multi-Factor Authentication](../authentication/concept-mfa-howitworks.md).
28
+
More information about Azure AD Multifactor Authentication can be found in the article, [How it works: Azure AD Multifactor Authentication](../authentication/concept-mfa-howitworks.md).
29
29
30
30
## Sign-in risk policy
31
31
32
-
Identity Protection analyzes signals from each sign-in, both real-time and offline, and calculates a risk score based on the probability that the sign-in wasn't performed by the user. Administrators can make a decision based on this risk score signal to enforce organizational requirements. Administrators can choose to block access, allow access, or allow access but require multi-factor authentication.
32
+
Identity Protection analyzes signals from each sign-in, both real-time and offline, and calculates a risk score based on the probability that the sign-in wasn't really the user. Administrators can make a decision based on this risk score signal to enforce organizational requirements like:
33
33
34
-
If risk is detected, users can perform multi-factor authentication to self-remediate and close the risky sign-in event to prevent unnecessary noise for administrators.
34
+
- Block access
35
+
- Allow access
36
+
- Require multifactor authentication
37
+
38
+
If risk is detected, users can perform multifactor authentication to self-remediate and close the risky sign-in event to prevent unnecessary noise for administrators.
35
39
36
40
> [!NOTE]
37
-
> Users must have previously registered for Azure AD Multi-Factor Authentication before triggering the sign-in risk policy.
41
+
> Users must have previously registered for Azure AD Multifactor Authentication before triggering the sign-in risk policy.
38
42
39
43
### Custom Conditional Access policy
40
44
@@ -54,9 +58,6 @@ If risk is detected, users can perform self-service password reset to self-remed
54
58
## Next steps
55
59
56
60
-[Enable Azure AD self-service password reset](../authentication/howto-sspr-deployment.md)
57
-
58
-
-[Enable Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)
59
-
60
-
-[Enable Azure AD Multi-Factor Authentication registration policy](howto-identity-protection-configure-mfa-policy.md)
61
-
61
+
-[Enable Azure AD Multifactor Authentication](../authentication/howto-mfa-getstarted.md)
62
+
-[Enable Azure AD Multifactor Authentication registration policy](howto-identity-protection-configure-mfa-policy.md)
62
63
-[Enable sign-in and user risk policies](howto-identity-protection-configure-risk-policies.md)
0 commit comments