Skip to content

Commit 680169c

Browse files
committed
2 parents c7b6e12 + 6d97f3a commit 680169c

File tree

122 files changed

+1723
-842
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

122 files changed

+1723
-842
lines changed

.openpublishing.publish.config.json

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -151,17 +151,17 @@
151151
"url": "https://github.com/Azure-Samples/functions-python-tensorflow-tutorial",
152152
"branch": "master",
153153
"branch_mapping": {}
154-
},
154+
},
155155
{
156156
"path_to_root": "functions-quickstart-templates",
157157
"url": "https://github.com/Azure/azure-functions-templates",
158158
"branch": "dev"
159-
},
159+
},
160160
{
161161
"path_to_root": "functions-docs-csharp",
162162
"url": "https://github.com/Azure-Samples/functions-docs-csharp",
163163
"branch": "master"
164-
},
164+
},
165165
{
166166
"path_to_root": "functions-docs-javascript",
167167
"url": "https://github.com/Azure-Samples/functions-docs-javascript",
@@ -171,12 +171,12 @@
171171
"path_to_root": "functions-docs-typescript",
172172
"url": "https://github.com/Azure-Samples/functions-docs-typescript",
173173
"branch": "master"
174-
},
174+
},
175175
{
176176
"path_to_root": "functions-docs-python",
177177
"url": "https://github.com/Azure-Samples/functions-docs-python",
178178
"branch": "master"
179-
},
179+
},
180180
{
181181
"path_to_root": "functions-docs-powershell",
182182
"url": "https://github.com/Azure-Samples/functions-docs-powershell",
@@ -186,6 +186,11 @@
186186
"url": "https://github.com/Azure-Samples/cognitive-services-personalizer-samples",
187187
"branch": "master"
188188
},
189+
{
190+
"path_to_root": "samples-cognitive-services-data-files",
191+
"url": "https://github.com/Azure-Samples/cognitive-services-sample-data-files",
192+
"branch": "master"
193+
},
189194
{
190195
"path_to_root": "samples-luis",
191196
"url": "https://github.com/Azure-Samples/cognitive-services-language-understanding",

.openpublishing.redirection.json

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6768,6 +6768,11 @@
67686768
"redirect_url": "/azure/logic-apps/logic-apps-using-sap-connector",
67696769
"redirect_document_id": true
67706770
},
6771+
{
6772+
"source_path": "articles/connectors/connectors-create-api-googledrive.md",
6773+
"redirect_url": "https://docs.microsoft.com/connectors/googledrive/",
6774+
"redirect_document_id": true
6775+
},
67716776
{
67726777
"source_path": "articles/logic-apps/custom-connector-build-web-api-app-tutorial.md",
67736778
"redirect_url": "https://docs.microsoft.com/connectors/custom-connectors/create-web-api-connector",
@@ -32613,6 +32618,21 @@
3261332618
"redirect_url": "/azure/cognitive-services/bing-web-search/language-support",
3261432619
"redirect_document_id": true
3261532620
},
32621+
{
32622+
"source_path": "articles/cognitive-services/Bing-Custom-Search/sdk-csharp-quick-start.md",
32623+
"redirect_url": "/azure/cognitive-services/bing-custom-search/quickstarts/client-libraries",
32624+
"redirect_document_id": false
32625+
},
32626+
{
32627+
"source_path": "articles/cognitive-services/Bing-Custom-Search/sdk-java-quickstart.md",
32628+
"redirect_url": "/azure/cognitive-services/bing-custom-search/quickstarts/client-libraries",
32629+
"redirect_document_id": false
32630+
},
32631+
{
32632+
"source_path": "articles/cognitive-services/Bing-Custom-Search/sdk-python-quickstart.md",
32633+
"redirect_url": "/azure/cognitive-services/bing-custom-search/quickstarts/client-libraries",
32634+
"redirect_document_id": false
32635+
},
3261632636
{
3261732637
"source_path": "articles/cognitive-services/Bing-Autosuggest/bing-autosuggest-supported-languages.md",
3261832638
"redirect_url": "/azure/cognitive-services/bing-autosuggest/language-support",
@@ -46669,6 +46689,11 @@
4666946689
"redirect_url": "/azure/active-directory-domain-services/tutorial-create-instance#update-dns-settings-for-the-azure-virtual-network",
4667046690
"redirect_document_id": false
4667146691
},
46692+
{
46693+
"source_path": "articles/active-directory/authentication/howto-password-ban-bad-configure.md",
46694+
"redirect_url": "/azure/active-directory/authentication/tutorial-configure-custom-password-protection",
46695+
"redirect_document_id": true
46696+
},
4667246697
{
4667346698
"source_path": "articles/media-services/previous/media-services-fmp4-live-ingest-overview.md",
4667446699
"redirect_url": "/azure/media-services/media-services-fmp4-live-ingest-overview",
@@ -49168,6 +49193,6 @@
4916849193
"source_path": "articles/service-fabric/service-fabric-cicd-your-linux-applications-with-jenkins.md",
4916949194
"redirect_url": "/azure/jenkins/service-fabric-cicd-your-linux-applications-with-jenkins",
4917049195
"redirect_document_id": true
49171-
}
49196+
},
4917249197
]
4917349198
}

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@
1313
href: tutorial-enable-azure-mfa.md
1414
- name: Enable password writeback to on-premises
1515
href: tutorial-enable-sspr-writeback.md
16+
- name: Configure custom banned password lists
17+
href: tutorial-configure-custom-password-protection.md
1618
- name: Integrate Azure Identity Protection
1719
href: tutorial-risk-based-sspr-mfa.md
1820
- name: Concepts
@@ -108,8 +110,6 @@
108110
href: howto-registration-mfa-sspr-combined-troubleshoot.md
109111
- name: Azure AD password protection
110112
items:
111-
- name: Configure the banned password list
112-
href: howto-password-ban-bad-configure.md
113113
- name: On-premises integration
114114
items:
115115
- name: Deploy Azure AD password protection

articles/active-directory/authentication/howto-password-ban-bad-configure.md

Lines changed: 0 additions & 61 deletions
This file was deleted.
Loading
Loading
29.7 KB
Loading
Loading
Lines changed: 126 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,126 @@
1+
---
2+
title: Configure custom Azure Active Directory password protection lists
3+
description: In this tutorial, you learn how to configure custom banned password protection lists for Azure Active Directory to restrict common words in your environment.
4+
5+
services: active-directory
6+
ms.service: active-directory
7+
ms.subservice: authentication
8+
ms.topic: tutorial
9+
ms.date: 02/27/2020
10+
11+
ms.author: iainfou
12+
author: iainfoulds
13+
ms.reviewer: rogoya
14+
15+
ms.collection: M365-identity-device-management
16+
17+
# Customer intent: As an Azure AD Administrator, I want to learn how to configure custom banned passwords to prevent users in my organization from using common insecure passwords.
18+
---
19+
# Tutorial: Configure custom banned passwords for Azure Active Directory password protection
20+
21+
Users often create passwords that use common local words such as a school, sports team, or famous person. These passwords are easy to guess, and weak against dictionary-based attacks. To enforce strong passwords in your organization, the Azure Active Directory (Azure AD) custom banned password list let you add specific strings to evaluate and block. A password change request fails if there's a match in the custom banned password list.
22+
23+
In this tutorial you learn how to:
24+
25+
> [!div class="checklist"]
26+
> * Enable custom banned passwords
27+
> * Add entries to the custom banned password list
28+
> * Test password changes with a banned password
29+
30+
## Prerequisites
31+
32+
To complete this tutorial, you need the following resources and privileges:
33+
34+
* A working Azure AD tenant with at least a trial license enabled.
35+
* If needed, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
36+
* An account with *global administrator* privileges.
37+
* A non-administrator user with a password you know, such as *testuser*. You test a password change event using this account in this tutorial.
38+
* If you need to create a user, see [Quickstart: Add new users to Azure Active Directory](../add-users-azure-active-directory.md).
39+
* To test the password change operation using a banned password, the Azure AD tenant must be [configured for self-service password reset](tutorial-enable-sspr.md).
40+
41+
## What are banned password lists?
42+
43+
Azure AD includes a global banned password list. The contents of the global banned password list isn't based on any external data source. Instead, the global banned password list is based on the ongoing results of Azure AD security telemetry and analysis. When a user or administrator tries to change or reset their credentials, the desired password is checked against the list of banned passwords. The password change request fails if there's a match in the global banned password list.
44+
45+
To give you flexibility in what passwords are allowed, you can also define a custom banned password list. The custom banned password list works alongside the global banned password list to enforce strong passwords in your organization. Organizational-specific terms can be added to the custom banned password list, such as the following examples:
46+
47+
* Brand names
48+
* Product names
49+
* Locations, such as company headquarters
50+
* Company-specific internal terms
51+
* Abbreviations that have specific company meaning
52+
53+
When a user attempts to reset a password to something that's on the global or custom banned password list, they see one of the following error messages:
54+
55+
* *Unfortunately, your password contains a word, phrase, or pattern that makes your password easily guessable. Please try again with a different password.*
56+
* *Unfortunately, you can't use that password because it contains words or characters that have been blocked by your administrator. Please try again with a different password.*
57+
58+
The custom banned password list is limited to a maximum of 1000 terms. It's not designed for blocking large lists of passwords. To maximize the benefits of the custom banned password list, review the [custom banned password list concepts](concept-password-ban-bad.md#custom-banned-password-list) and [password evaluation algorithm overview](concept-password-ban-bad.md#how-are-passwords-evaluated).
59+
60+
## Configure custom banned passwords
61+
62+
Let's enable the custom banned password list and add some entries. You can add additional entries to the custom banned password list at any time.
63+
64+
To enable the custom banned password list and add entries to it, complete the following steps:
65+
66+
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
67+
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
68+
1. Under the **Manage** menu header, select **Authentication methods**, then **Password protection**.
69+
1. Set the option for **Enforce custom list** to *Yes*.
70+
1. Add strings to the **Custom banned password list**, one string per line. The following considerations and limitations apply to the custom banned password list:
71+
72+
* The custom banned password list can contain up to 1000 terms.
73+
* The custom banned password list is case-insensitive.
74+
* The custom banned password list considers common character substitution, such as "o" and "0", or "a" and "@".
75+
* The minimum string length is four characters, and the maximum is 16 characters.
76+
77+
Specify your own custom passwords to ban, as shown in the following example
78+
79+
[![](media/tutorial-configure-custom-password-protection/enable-configure-custom-banned-passwords-cropped.png "Modify the custom banned password list under Authentication Methods in the Azure portal")](media/tutorial-configure-custom-password-protection/enable-configure-custom-banned-passwords.png#lightbox)
80+
81+
1. Leave the option for **Enable password protection on Windows Server Active Directory** to *No*.
82+
1. To enable the custom banned passwords and your entries, select **Save**.
83+
84+
It may take several hours for updates to the custom banned password list to be applied.
85+
86+
For a hybrid environment, you can also [deploy Azure AD password protection to an on-premises environment](howto-password-ban-bad-on-premises-deploy.md). The same global and custom banned password lists are used for both cloud and on-prem password change requests.
87+
88+
## Test custom banned password list
89+
90+
To see the custom banned password list in action, try to change the password to a variation of one that you added in the previous section. When Azure AD tries to process the password change, the password is matched against an entry in the custom banned password list. An error is then displayed to the user.
91+
92+
> [!NOTE]
93+
> Before a user can reset their password in the web-based portal, the Azure AD tenant must be [configured for self-service password reset](tutorial-enable-sspr.md).
94+
95+
1. Go to the **My Apps** page at [https://myapps.microsoft.com](https://myapps.microsoft.com).
96+
1. In the top-right corner, select your name, then choose **Profile** from the drop-down menu.
97+
98+
![Select profile](media/tutorial-configure-custom-password-protection/myapps-profile.png)
99+
100+
1. On the **Profile** page, select **Change password**.
101+
1. On the **Change password** page, enter the existing (old) password. Enter and confirm a new password that's on the custom banned password list you defined in the previous section, then select **Submit**.
102+
1. An error message is returned that tells you the password has been blocked by the administrator, as shown in the following example:
103+
104+
![Error message displayed when you try to use a password that's part of the custom banned password list](media/tutorial-configure-custom-password-protection/password-change-error.png)
105+
106+
## Clean up resources
107+
108+
If you no longer want to use the custom banned password list you have configured as part of this tutorial, complete the following steps:
109+
110+
1. Sign in to the [Azure portal](https://portal.azure.com).
111+
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
112+
1. Under the **Manage** menu header, select **Authentication methods**, then **Password protection**.
113+
1. Set the option for **Enforce custom list** to *No*.
114+
1. To update the custom banned password configuration, select **Save**.
115+
116+
## Next steps
117+
118+
In this tutorial, you enabled and configured custom password protection lists for Azure AD. You learned how to:
119+
120+
> [!div class="checklist"]
121+
> * Enable custom banned passwords
122+
> * Add entries to the custom banned password list
123+
> * Test password changes with a banned password
124+
125+
> [!div class="nextstepaction"]
126+
> [Enable risk-based Azure Multi-Factor Authentication](tutorial-mfa-applications.md)

articles/active-directory/devices/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -36,16 +36,16 @@ Device identity management is the foundation for [device-based Conditional Acces
3636
To get a device in Azure AD, you have multiple options:
3737

3838
- **Azure AD registered**
39-
- Devices that are Azure AD registered are typically personally owned or mobile devices, and are signed into with a personal Microsoft account or another local account.
39+
- Devices that are Azure AD registered are typically personally owned or mobile devices, and are signed in with a personal Microsoft account or another local account.
4040
- Windows 10
4141
- iOS
4242
- Android
4343
- MacOS
4444
- **Azure AD joined**
45-
- Devices that are Azure AD joined are owned by an organization, and are signed in to with an Azure AD account belonging to that organization. They exist only in the cloud.
45+
- Devices that are Azure AD joined are owned by an organization, and are signed in with an Azure AD account belonging to that organization. They exist only in the cloud.
4646
- Windows 10
4747
- **Hybrid Azure AD joined**
48-
- Devices that are hybrid Azure AD joined are owned by an organization, and are signed in to with an Azure AD account belonging to that organization. They exist in the cloud and on-premises.
48+
- Devices that are hybrid Azure AD joined are owned by an organization, and are signed in with an Azure AD account belonging to that organization. They exist in the cloud and on-premises.
4949
- Windows 7, 8.1, or 10
5050
- Windows Server 2008 or newer
5151

0 commit comments

Comments
 (0)