You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/stale.yml
+1-2Lines changed: 1 addition & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -19,8 +19,7 @@ jobs:
19
19
close-pr-label: auto-close
20
20
exempt-pr-labels: keep-open
21
21
operations-per-run: 1200
22
-
ascending: true
23
-
start-date: '2021-08-10'
22
+
ascending: false
24
23
stale-pr-message: >
25
24
This pull request has been inactive for at least 14 days.
26
25
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.docs.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation) for instructions.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/user-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
8
8
ms.service: active-directory
9
9
ms.workload: identity
10
10
ms.topic: conceptual
11
-
ms.date: 10/01/2021
11
+
ms.date: 10/22/2021
12
12
ms.author: kengaderdus
13
13
ms.subservice: B2C
14
14
ms.custom: b2c-support
@@ -21,7 +21,7 @@ In Azure Active Directory B2C (Azure AD B2C), there are several types of account
21
21
The following types of accounts are available:
22
22
23
23
-**Work account** - A work account can access resources in a tenant, and with an administrator role, can manage tenants.
24
-
-**Guest account** - A guest account can only be a Microsoft account or an Azure AD user that can be used to access applications or manage tenants.
24
+
-**Guest account** - A guest account can only be a Microsoft account or an Azure AD user that can be used to share administration responsibilities such as [managing a tenant](tenant-management.md).
25
25
-**Consumer account** - A consumer account is used by a user of the applications you've registered with Azure AD B2C. Consumer accounts can be created by:
26
26
- The user going through a sign-up user flow in an Azure AD B2C application
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-authentication-sms-supported-apps.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,6 +32,7 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
32
32
| Microsoft Stream | ● ||
33
33
| Microsoft Power Apps | ● ||
34
34
| Microsoft Azure | ● | ● |
35
+
| Microsoft Authenticator || ● |
35
36
| Azure Virtual Desktop | ● ||
36
37
37
38
*_SMS sign-in isn't available for office applications, such as Word, Excel, etc., when accessed directly on the web, but is available when accessed through the [Office 365 web app](https://www.office.com)_
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/multi-factor-authentication-faq.yml
+8-1Lines changed: 8 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -247,11 +247,18 @@ sections:
247
247
248
248
A workaround for this error is to have separate user accounts for admin-related and non-admin operations. Later, you can link mailboxes between your admin account and non-admin account so that you can sign in to Outlook by using your non-admin account. For more details about this solution, learn how to [give an administrator the ability to open and view the contents of a user's mailbox](https://help.outlook.com/141/gg709759.aspx?sl=1).
249
249
250
+
- question: |
251
+
What are the possible reasons why a user fails, with the error code "LsaLogonUser failed with NTSTATUS -1073741715 for MFA Server"?
252
+
answer: |
253
+
Error 1073741715 = Status Logon Failure -> The attempted logon is invalid. This is due to either a bad username or authentication.
254
+
255
+
A plausible reason for this error: If the primary credentials entered are correct, there might be a mismatch between the supported NTLM version on the MFA server and the domain controller. MFA Server supports only NTLMv1 (LmCompatabilityLevel=1 thru 4) and not NTLMv2 (LmCompatabilityLevel=5).
256
+
250
257
additionalContent: |
251
258
## Next steps
252
259
If your question isn't answered here, the following support options are available:
253
260
254
261
* Search the [Microsoft Support Knowledge Base](https://support.microsoft.com) for solutions to common technical issues.
255
262
* Search for and browse technical questions and answers from the community, or ask your own question in the [Azure Active Directory Q&A](/answers/topics/azure-active-directory.html).
256
263
* Contact Microsoft professional through [Azure Multi-Factor Authentication Server support](https://support.microsoft.com/oas/default.aspx?prid=14947). When contacting us, it's helpful if you can include as much information about your issue as possible. Information you can supply includes the page where you saw the error, the specific error code, the specific session ID, and the ID of the user who saw the error.
257
-
* If you're a legacy PhoneFactor customer and you have questions or need help with resetting a password, use the [[email protected]](mailto:[email protected]) e-mail address to open a support case.
264
+
* If you're a legacy PhoneFactor customer and you have questions or need help with resetting a password, use the [[email protected]](mailto:[email protected]) e-mail address to open a support case.
When creating Conditional Access policies, administrators have asked for the ability to target or exclude specific devices in their environment. The condition Filter for devices give administrators this capability. Now you can target specific devices using [supported operators and properties for device filter](#supported-operators-and-device-properties-for-filters) and the other available assignment conditions in your Conditional Access policies.
20
+
When creating Conditional Access policies, administrators have asked for the ability to target or exclude specific devices in their environment. The condition filter for devices give administrators this capability. Now you can target specific devices using [supported operators and properties for device filters](#supported-operators-and-device-properties-for-filters) and the other available assignment conditions in your Conditional Access policies.
21
21
22
22
:::image type="content" source="media/concept-condition-filters-for-devices/create-filter-for-devices-condition.png" alt-text="Creating a filter for device in Conditional Access policy conditions":::
23
23
24
24
25
25
## Common scenarios
26
26
27
-
There are multiple scenarios that organizations can now enable using Filter for devices condition. Below are some core scenarios with examples of how to use this new condition.
27
+
There are multiple scenarios that organizations can now enable using filter for devices condition. Below are some core scenarios with examples of how to use this new condition.
28
28
29
29
- Restrict access to privileged resources like Microsoft Azure Management, to privileged users, accessing from [privileged or secure admin workstations](/security/compass/privileged-access-devices). For this scenario, organizations would create two Conditional Access policies:
30
30
- Policy 1: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, and for Access controls, Grant access, but require multifactor authentication and require device to be marked as compliant.
31
-
- Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding filters for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
31
+
- Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
32
32
- Block access to organization resources from devices running an unsupported Operating System version like Windows 7. For this scenario, organizations would create the following two Conditional Access policies:
33
33
- Policy 1: All users, accessing all cloud apps and for Access controls, Grant access, but require device to be marked as compliant or require device to be hybrid Azure AD joined.
34
-
- Policy 2: All users, accessing all cloud apps, including filters for devices using rule expression device.operatingSystem equals Windows and device.operatingSystemVersion startsWith "6.1" and for Access controls, Block.
34
+
- Policy 2: All users, accessing all cloud apps, including a filter for devices using rule expression device.operatingSystem equals Windows and device.operatingSystemVersion startsWith "6.1" and for Access controls, Block.
35
35
- Do not require multifactor authentication for specific accounts like service accounts when used on specific devices like Teams phones or Surface Hub devices. For this scenario, organizations would create the following two Conditional Access policies:
36
36
- Policy 1: All users excluding service accounts, accessing all cloud apps, and for Access controls, Grant access, but require multifactor authentication.
37
-
- Policy 2: Select users and groups and include group that contains service accounts only, accessing all cloud apps, excluding filters for devices using rule expression device.extensionAttribute2 not equals TeamsPhoneDevice and for Access controls, Block.
37
+
- Policy 2: Select users and groups and include group that contains service accounts only, accessing all cloud apps, excluding a filter for devices using rule expression device.extensionAttribute2 not equals TeamsPhoneDevice and for Access controls, Block.
38
38
39
39
## Create a Conditional Access policy
40
40
41
41
Filter for devices is an option when creating a Conditional Access policy in the Azure portal or using the Microsoft Graph API.
42
42
43
43
> [!IMPORTANT]
44
-
> Device state and Filter for devices cannot be used together in Conditional Access policy.
44
+
> Device state and filter for devices cannot be used together in Conditional Access policy.
45
45
46
46
The following steps will help create two Conditional Access policies to support the first scenario under [Common scenarios](#common-scenarios).
47
47
@@ -64,7 +64,7 @@ Policy 1: All users with the directory role of Global administrator, accessing t
64
64
1. Confirm your settings and set **Enable policy** to **On**.
65
65
1. Select **Create** to create to enable your policy.
66
66
67
-
Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
67
+
Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding a filter for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
68
68
69
69
1. Select **New policy**.
70
70
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
@@ -88,7 +88,7 @@ Policy 2: All users with the directory role of Global administrator, accessing t
88
88
89
89
### Filter for devices Graph API
90
90
91
-
The filter for devices API is available in Microsoft Graph v1.0 endpoint and can be accessed using https://graph.microsoft.com/v1.0/identity/conditionalaccess/policies/. You can configure filter for devices when creating a new Conditional Access policy or you can update an existing policy to configure filter for devices condition. To update an existing policy, you can do a patch call on the Microsoft Graph v1.0 endpoint mentioned above by appending the policy ID of an existing policy and executing the following request body. The example here shows configuring a filter for devices condition excluding device that are not marked as SAW devices. The rule syntax can consist of more than one single expression. To learn more about the syntax, see [dynamic membership rules for groups in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/enterprise-users/groups-dynamic-membership).
91
+
The filter for devices API is available in Microsoft Graph v1.0 endpoint and can be accessed using https://graph.microsoft.com/v1.0/identity/conditionalaccess/policies/. You can configure a filter for devices when creating a new Conditional Access policy or you can update an existing policy to configure the filter for devices condition. To update an existing policy, you can do a patch call on the Microsoft Graph v1.0 endpoint mentioned above by appending the policy ID of an existing policy and executing the following request body. The example here shows configuring a filter for devices condition excluding device that are not marked as SAW devices. The rule syntax can consist of more than one single expression. To learn more about the syntax, see [dynamic membership rules for groups in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/enterprise-users/groups-dynamic-membership).
92
92
93
93
```json
94
94
{
@@ -105,7 +105,7 @@ The filter for devices API is available in Microsoft Graph v1.0 endpoint and can
105
105
106
106
## Supported operators and device properties for filters
107
107
108
-
The following device attributes can be used with filters for devices condition in Conditional Access.
108
+
The following device attributes can be used with the filter for devices condition in Conditional Access.
@@ -120,11 +120,11 @@ The following device attributes can be used with filters for devices condition i
120
120
| profileType | Equals, NotEquals | A valid profile type set for a device. Supported values are: RegisteredDevice (default), SecureVM (used for Windows VMs in Azure enabled with Azure AD sign in.), Printer (used for printers), Shared (used for shared devices), IoT (used for IoT devices) | (device.profileType -notIn [“Printer”, “Shared”, “IoT”]|
121
121
| systemLabels | Contains, NotContains | List of labels applied to the device by the system. Some of the supported values are: AzureResource (used for Windows VMs in Azure enabled with Azure AD sign in), M365Managed (used for devices managed using Microsoft Managed Desktop), MultiUser (used for shared devices) | (device.systemLabels -contains "M365Managed") |
122
122
| trustType | Equals, NotEquals | A valid registered state for devices. Supported values are: AzureAD (used for Azure AD joined devices), ServerAD (used for Hybrid Azure AD joined devices), Workplace (used for Azure AD registered devices) | (device.trustType -notIn ‘ServerAD, Workplace’) |
123
-
| extensionAttribute1-15 | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | extensionAttributes1-15 are attributes that customers can use for device objects. Customers can update any of the extensionAttributes1 through 15 with custom values and use them in filters for devices condition in Conditional Access. Any string value can be used. | (device.extensionAttribute1 -eq ‘SAW’) |
123
+
| extensionAttribute1-15 | Equals, NotEquals, StartsWith, NotStartsWith, EndsWith, NotEndsWith, Contains, NotContains, In, NotIn | extensionAttributes1-15 are attributes that customers can use for device objects. Customers can update any of the extensionAttributes1 through 15 with custom values and use them in the filter for devices condition in Conditional Access. Any string value can be used. | (device.extensionAttribute1 -eq ‘SAW’) |
124
124
125
125
## Policy behavior with filter for devices
126
126
127
-
Filter for devices condition in Conditional Access evaluates policy based on device attributes of a registered device in Azure AD and hence it is important to understand under what circumstances the policy is applied or not applied. The table below illustrates the behavior when filters for devices condition are configured.
127
+
The filter for devices condition in Conditional Access evaluates policy based on device attributes of a registered device in Azure AD and hence it is important to understand under what circumstances the policy is applied or not applied. The table below illustrates the behavior when a filter for devices condition are configured.
128
128
129
129
| Filter for devices condition | Device registration state | Device filter Applied
0 commit comments