Skip to content

Commit 6e28540

Browse files
authored
Merge pull request #231040 from MicrosoftDocs/main
3/16 AM Publish
2 parents 9843530 + 789532a commit 6e28540

File tree

75 files changed

+1014
-453
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

75 files changed

+1014
-453
lines changed

articles/active-directory-b2c/custom-policies-series-hello-world.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ If you haven't already done so, create the following encryption keys. To automat
5959

6060
<BuildingBlocks>
6161
<!-- Building Blocks Here-->
62-
<BuildingBlocks>
62+
</BuildingBlocks>
6363

6464
<ClaimsProviders>
6565
<!-- Claims Providers Here-->
@@ -303,4 +303,4 @@ Next, learn:
303303

304304
- About custom policy [claims data type](claimsschema.md#datatype).
305305

306-
- About custom policy [user input types](claimsschema.md#userinputtype).
306+
- About custom policy [user input types](claimsschema.md#userinputtype).

articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use system-preferred multifactor authentication
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 03/02/2023
7+
ms.date: 03/16/2023
88
ms.author: justinha
99
author: justinha
1010
manager: amycolannino
@@ -24,6 +24,9 @@ System-preferred MFA is a Microsoft managed setting, which is a [tristate policy
2424

2525
After system-preferred MFA is enabled, the authentication system does all the work. Users don't need to set any authentication method as their default because the system always determines and presents the most secure method they registered.
2626

27+
>[!NOTE]
28+
>System-preferred MFA is a key security upgrade to traditional second factor notifications. We highly recommend enabling system-preferred MFA in the near term for improved sign-in security.
29+
2730
## Enable system-preferred MFA
2831

2932
To enable system-preferred MFA in advance, you need to choose a single target group for the schema configuration, as shown in the [Request](#request) example.
@@ -58,7 +61,7 @@ https://graph.microsoft.com/beta/policies/authenticationMethodsPolicy
5861
5962
### Request
6063

61-
The following example excludes a sample target group and includes all users. For more information, see [Update authenticationMethodsPolicy](/graph/api/authenticationmethodspolicy-update?view=graph-rest-beta).
64+
The following example excludes a sample target group and includes all users. For more information, see [Update authenticationMethodsPolicy](/graph/api/authenticationmethodspolicy-update).
6265

6366
```http
6467
PATCH https://graph.microsoft.com/beta/policies/authenticationMethodsPolicy

articles/active-directory/authentication/how-to-authentication-sms-supported-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/29/2023
9+
ms.date: 03/16/2023
1010
ms.author: justinha
1111
author: aanjusingh
1212
manager: amycolannino
@@ -47,7 +47,7 @@ For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Compa
4747
| --- | --- |
4848
| Native desktop Microsoft apps | Microsoft Teams, O365 apps, Word, Excel, etc.|
4949
| Native mobile Microsoft apps (except Microsoft Teams, Company Portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
50-
| Microsoft 365 web apps (accessed directly on web) | [Outlook](https://outlook.live.com/owa/), [Word](https://office.live.com/start/Word.aspx), [Excel](https://office.live.com/start/Excel.aspx), [PowerPoint](https://office.live.com/start/PowerPoint.aspx), [OneDrive](https://onedrive.live.com/about/signin)|
50+
| Microsoft 365 web apps (accessed directly on web) | [Outlook](https://outlook.live.com/owa/), [Word](https://office.live.com/start/Word.aspx), [Excel](https://office.live.com/start/Excel.aspx), [PowerPoint](https://office.live.com/start/PowerPoint.aspx)|
5151

5252
## Support for Non-Microsoft apps
5353

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 01/29/2023
9+
ms.date: 03/16/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -106,21 +106,17 @@ When you install the extension, you need the *Tenant ID* and admin credentials f
106106

107107
The NPS server must be able to communicate with the following URLs over TCP port 443:
108108

109-
* *https:\//strongauthenticationservice.auth.microsoft.com* (for Azure Public cloud customers).
110-
* *https:\//strongauthenticationservice.auth.microsoft.us* (for Azure Government customers).
111-
* *https:\//strongauthenticationservice.auth.microsoft.cn* (for Azure China 21Vianet customers).
112-
* *https:\//adnotifications.windowsazure.com*
113-
* *https:\//login.microsoftonline.com*
114-
* *https:\//credentials.azure.com*
109+
* `https:\//login.microsoftonline.com`
110+
* `https:\//credentials.azure.com`
115111

116112
Additionally, connectivity to the following URLs is required to complete the [setup of the adapter using the provided PowerShell script](#run-the-powershell-script):
117113

118-
* *https:\//login.microsoftonline.com*
119-
* *https:\//provisioningapi.microsoftonline.com*
120-
* *https:\//aadcdn.msauth.net*
121-
* *https:\//www.powershellgallery.com*
122-
* *https:\//go.microsoft.com*
123-
* *https:\//aadcdn.msftauthimages.net*
114+
* `https:\//login.microsoftonline.com`
115+
* `https:\//provisioningapi.microsoftonline.com`
116+
* `https:\//aadcdn.msauth.net`
117+
* `https:\//www.powershellgallery.com`
118+
* `https:\//go.microsoft.com`
119+
* `https:\//aadcdn.msftauthimages.net`
124120

125121
## Prepare your environment
126122

articles/active-directory/devices/assign-local-admin.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,8 @@ Device administrators are assigned to all Azure AD joined devices. You can’t s
5858

5959
- Upto 4 hours have passed for Azure AD to issue a new Primary Refresh Token with the appropriate privileges.
6060
- User signs out and signs back in, not lock/unlock, to refresh their profile.
61-
- Users won't be listed in the local administrator group, the permissions are received through the Primary Refresh Token.
61+
62+
Users won't be listed in the local administrator group, the permissions are received through the Primary Refresh Token.
6263

6364
> [!NOTE]
6465
> The above actions are not applicable to users who have not signed in to the relevant device previously. In this case, the administrator privileges are applied immediately after their first sign-in to the device.

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -425,7 +425,7 @@ Share your feedback about this feature or report problems with using it on the [
425425

426426
### Missing application
427427

428-
If the Azure Windows VM Sign-In application is missing from Conditional Access, make sure that the application isn't in the tenant:
428+
If the Azure Windows VM Sign-In application is missing from Conditional Access, make sure that the application is in the tenant:
429429

430430
1. Sign in to the Azure portal.
431431
1. Browse to **Azure Active Directory** > **Enterprise applications**.

articles/active-directory/devices/manage-stale-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ If your device is under control of Intune or any other MDM solution, retire the
9090

9191
### System-managed devices
9292

93-
Don't delete system-managed devices. These devices are generally devices such as Autopilot. Once deleted, these devices can't be reprovisioned. The new `Get-AzureADDevice` cmdlet excludes system-managed devices by default.
93+
Don't delete system-managed devices. These devices are generally devices such as Autopilot. Once deleted, these devices can't be reprovisioned.
9494

9595
### Hybrid Azure AD joined devices
9696

articles/active-directory/fundamentals/service-accounts-principal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717

1818
# Securing service principals in Azure Active Directory
1919

20-
An Azure Active Directory (Azure AD) service principals are the local representation of an application object in a tenant or directory. It's the identity of the application instance. Service principals define application access, and resources the application accesses. A service principal is created in each tenant where the application is used, and references the globally unique application object. The tenant secures the service principal sign-in and access to resources.
20+
An Azure Active Directory (Azure AD) service principal is the local representation of an application object in a tenant or directory. It's the identity of the application instance. Service principals define application access and resources the application accesses. A service principal is created in each tenant where the application is used and references the globally unique application object. The tenant secures the service principal sign-in and access to resources.
2121

2222
Learn more: [Application and service principal objects in Azure AD](../develop/app-objects-and-service-principals.md)
2323

articles/active-directory/manage-apps/configure-authentication-for-federated-users-portal.md

Lines changed: 53 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: infrastructure-services
1010
ms.topic: how-to
11-
ms.date: 01/02/2023
11+
ms.date: 03/16/2023
1212
ms.author: jomondi
1313
ms.reviewer: ludwignick
1414
ms.custom: seoapril2019, contperf-fy22q2
@@ -33,7 +33,8 @@ For federated users with cloud-enabled credentials, such as SMS sign-in or FIDO
3333
To configure HRD policy for an application in Azure AD, you need:
3434

3535
- An Azure account with an active subscription. If you don't already have one, you can [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
36-
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
36+
- One of the following roles: Global Administrator, or owner of the service principal.
37+
3738
::: zone pivot="powershell-hrd"
3839
- The latest Azure AD PowerShell cmdlet preview.
3940
::: zone-end
@@ -91,13 +92,17 @@ The following policy auto-accelerates users to a federated identity provider sig
9192
::: zone pivot="powershell-hrd"
9293
9394
```powershell
94-
New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"AccelerateToFederatedDomain`":true}}") -DisplayName BasicAutoAccelerationPolicy -Type HomeRealmDiscoveryPolicy
95+
New-AzureADPolicy
96+
-Definition @("{`"HomeRealmDiscoveryPolicy`":{`"AccelerateToFederatedDomain`":true}}") -DisplayName BasicAutoAccelerationPolicy
97+
-Type HomeRealmDiscoveryPolicy
9598
```
9699
::: zone-end
97100

98101
::: zone pivot="graph-hrd"
99102

100-
```json
103+
```http
104+
POST /policies/homeRealmDiscoveryPolicies
105+
101106
"HomeRealmDiscoveryPolicy": {
102107
"AccelerateToFederatedDomain": true
103108
}
@@ -109,13 +114,18 @@ The following policy auto-accelerates users to a federated identity provider sig
109114
::: zone pivot="powershell-hrd"
110115

111116
```powershell
112-
New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"AccelerateToFederatedDomain`":true, `"PreferredDomain`":`"federated.example.edu`"}}") -DisplayName MultiDomainAutoAccelerationPolicy -Type HomeRealmDiscoveryPolicy
117+
New-AzureADPolicy
118+
-Definition @("{`"HomeRealmDiscoveryPolicy`":{`"AccelerateToFederatedDomain`":true, `"PreferredDomain`":`"federated.example.edu`"}}")
119+
-DisplayName MultiDomainAutoAccelerationPolicy
120+
-Type HomeRealmDiscoveryPolicy
113121
```
114122
::: zone-end
115123

116124
::: zone pivot="graph-hrd"
117125

118-
```json
126+
```http
127+
POST /policies/homeRealmDiscoveryPolicies
128+
119129
"HomeRealmDiscoveryPolicy": {
120130
"AccelerateToFederatedDomain": true,
121131
"PreferredDomain": [
@@ -128,9 +138,22 @@ New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"AccelerateToFe
128138
The following policy enables username/password authentication for federated users directly with Azure AD for specific applications:
129139

130140

141+
::: zone pivot="powershell-hrd"
142+
143+
144+
```powershell
145+
New-AzureADPolicy
146+
-Definition @("{`"HomeRealmDiscoveryPolicy`":{`"AllowCloudPasswordValidation`":true}}")
147+
-DisplayName EnableDirectAuthPolicy
148+
-Type HomeRealmDiscoveryPolicy
149+
```
150+
::: zone-end
151+
152+
131153
::: zone pivot="graph-hrd"
132154

133-
```json
155+
```http
156+
POST /policies/homeRealmDiscoveryPolicies
134157
135158
"EnableDirectAuthPolicy": {
136159
"AllowCloudPasswordValidation": true
@@ -142,10 +165,6 @@ The following policy enables username/password authentication for federated user
142165

143166
::: zone pivot="powershell-hrd"
144167

145-
```powershell
146-
New-AzureADPolicy -Definition @("{`"HomeRealmDiscoveryPolicy`":{`"AllowCloudPasswordValidation`":true}}") -DisplayName EnableDirectAuthPolicy -Type HomeRealmDiscoveryPolicy
147-
```
148-
149168
To see your new policy and get its **ObjectID**, run the following command:
150169

151170
```powershell
@@ -171,7 +190,9 @@ Get-AzureADServicePrincipal
171190
After you have the **ObjectID** of the service principal of the application for which you want to configure auto-acceleration, run the following command. This command associates the HRD policy that you created in step 1 with the service principal that you located in step 2.
172191

173192
```powershell
174-
Add-AzureADServicePrincipalPolicy -Id <ObjectID of the Service Principal> -RefObjectId <ObjectId of the Policy>
193+
Add-AzureADServicePrincipalPolicy
194+
-Id <ObjectID of the Service Principal>
195+
-RefObjectId <ObjectId of the Policy>
175196
```
176197

177198
You can repeat this command for each service principal to which you want to add the policy.
@@ -225,36 +246,35 @@ Use the previous example to get the **ObjectID** of the policy, and that of the
225246
226247
## Configuring policy through Graph Explorer
227248
228-
Set the HRD policy using Microsoft Graph. See [homeRealmDiscoveryPolicy](/graph/api/resources/homeRealmDiscoveryPolicy?view=graph-rest-1.0&preserve-view=true) resource type for information on how to create the policy.
229-
230249
From the Microsoft Graph explorer window:
231250
232-
1. Grant consent to the *Policy.ReadWrite.ApplicationConfiguration* permission.
233-
1. Use the URL https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies
234-
1. POST the new policy to this URL, or PATCH to https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies/{policyID} if overwriting an existing one.
235-
1. POST or PATCH contents:
236-
237-
```json
238-
{
239-
"definition": [
240-
"{\"HomeRealmDiscoveryPolicy\":
241-
{\"AccelerateToFederatedDomain\":true,
242-
\"PreferredDomain\":\"federated.example.edu\",
243-
\"AlternateIdLogin\":{\"Enabled\":true}}}"
244-
],
245-
"displayName": "Home Realm Discovery auto acceleration",
246-
"isOrganizationDefault": true
247-
}
251+
1. Sign in with one of the roles listed in the prerequisites section.
252+
1. Grant consent to the `Policy.ReadWrite.ApplicationConfiguration` permission.
253+
1. Use the [Home realm discovery policy](/graph/api/resources/homerealmdiscoverypolicy) to create a new policy.
254+
1. POST the new policy, or PATCH to update an existing policy.
255+
256+
```http
257+
PATCH /policies/homeRealmDiscoveryPolicies/{id}
258+
{
259+
"definition": [
260+
"{\"HomeRealmDiscoveryPolicy\":
261+
{\"AccelerateToFederatedDomain\":true,
262+
\"PreferredDomain\":\"federated.example.edu\",
263+
\"AlternateIdLogin\":{\"Enabled\":true}}}"
264+
],
265+
"displayName": "Home Realm Discovery auto acceleration",
266+
"isOrganizationDefault": true
267+
}
248268
```
249-
1. To see your new policy and get its ObjectID, run the following query:
269+
1. To view your new policy, run the following query:
250270
251271
```http
252-
GET https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies
272+
GET /policies/homeRealmDiscoveryPolicies/{id}
253273
```
254274
1. To delete the HRD policy you created, run the query:
255275
256276
```http
257-
DELETE https://graph.microsoft.com/v1.0/policies/homeRealmDiscoveryPolicies/{policy objectID}
277+
DELETE /policies/homeRealmDiscoveryPolicies/{id}
258278
```
259279
::: zone-end
260280

0 commit comments

Comments
 (0)