Skip to content

Commit 73291d2

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into lbbasic-1
2 parents a3f15a5 + 6d29110 commit 73291d2

File tree

101 files changed

+1140
-1627
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

101 files changed

+1140
-1627
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25215,7 +25215,7 @@
2521525215
},
2521625216
{
2521725217
"source_path_from_root": "/articles/azure-sql/managed-instance/azure-app-sync-network-configuration.md",
25218-
"redirect_url": "/azure/azure-sql/managed-instance/index.yml",
25218+
"redirect_url": "/azure/azure-sql/managed-instance/",
2521925219
"redirect_document_id": false
2522025220
},
2522125221
{

articles/active-directory-b2c/partner-bindid.md

Lines changed: 172 additions & 175 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 07/26/2021
9+
ms.date: 03/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -48,7 +48,7 @@ [email protected],1234567,2234567abcdef2234567abcdef,60,Contoso,HardwareKey
4848
```
4949

5050
> [!NOTE]
51-
> Make sure you include the header row in your CSV file. If a UPN has a single quote, escape it with another single quote. For example, if the UPN is my’[email protected], change it to my’’[email protected] when uploading the file.
51+
> Make sure you include the header row in your CSV file.
5252
5353
Once properly formatted as a CSV file, a Global Administrator can then sign in to the Azure portal, navigate to **Azure Active Directory > Security > MFA > OATH tokens**, and upload the resulting CSV file.
5454

articles/active-directory/develop/active-directory-signing-key-rollover.md

Lines changed: 86 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -286,10 +286,93 @@ Follow the steps below to verify that the key rollover logic is working.
286286
### <a name="other"></a>Web applications / APIs protecting resources using any other libraries or manually implementing any of the supported protocols
287287
If you are using some other library or manually implemented any of the supported protocols, you'll need to review the library or your implementation to ensure that the key is being retrieved from either the OpenID Connect discovery document or the federation metadata document. One way to check for this is to do a search in your code or the library's code for any calls out to either the OpenID discovery document or the federation metadata document.
288288

289-
If they key is being stored somewhere or hardcoded in your application, you can manually retrieve the key and update it accordingly by performing a manual rollover as per the instructions at the end of this guidance document. **It is strongly encouraged that you enhance your application to support automatic rollover** using any of the approaches outline in this article to avoid future disruptions and overhead if the Microsoft identity platform increases its rollover cadence or has an emergency out-of-band rollover.
289+
If the key is being stored somewhere or hardcoded in your application, you can manually retrieve the key and update it accordingly by performing a manual rollover as per the instructions at the end of this guidance document. **It is strongly encouraged that you enhance your application to support automatic rollover** using any of the approaches outline in this article to avoid future disruptions and overhead if the Microsoft identity platform increases its rollover cadence or has an emergency out-of-band rollover.
290290

291291
## How to test your application to determine if it will be affected
292-
You can validate whether your application supports automatic key rollover by downloading the scripts and following the instructions in [this GitHub repository.](https://github.com/AzureAD/azure-activedirectory-powershell-tokenkey)
292+
293+
You can validate whether your application supports automatic key rollover by using the following PowerShell scripts.
294+
295+
To check and update signing keys with PowerShell, you'll need the [MSIdentityTools](https://www.powershellgallery.com/packages/MSIdentityTools) PowerShell Module.
296+
297+
1. Install the [MSIdentityTools](https://www.powershellgallery.com/packages/MSIdentityTools) PowerShell Module:
298+
299+
```powershell
300+
Install-Module -Name MSIdentityTools
301+
```
302+
303+
1. Sign in by using the Connect-MgGraph command with an admin account to consent to the required scopes:
304+
305+
```powershell
306+
Connect-MgGraph -Scope "Application.ReadWrite.All"
307+
```
308+
309+
1. Get the list of available signing key thumbprints:
310+
311+
```powershell
312+
Get-MsIdSigningKeyThumbprint
313+
```
314+
315+
1. Pick any of the key thumbprints and configure Azure Active Directory to use that key with your application (get the app ID from the [Azure portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps)):
316+
317+
```powershell
318+
Update-MsIdApplicationSigningKeyThumbprint -ApplicationId <ApplicationId> -KeyThumbprint <Thumbprint>
319+
```
320+
321+
1. Test the web application by signing in to get a new token. The key update change is instantaneous, but make sure you use a new browser session (using, for example, Internet Explorer's "InPrivate," Chrome's "Incognito," or Firefox's "Private" mode) to ensure you are issued a new token.
322+
323+
1. For each of the returned signing key thumbprints, run the `Update-MsIdApplicationSigningKeyThumbprint` cmdlet and test your web application sign-in process.
324+
325+
1. If the web application signs you in properly, it supports automatic rollover. If it doesn't, modify your application to support manual rollover. Check out [Establishing a manual rollover process](#how-to-perform-a-manual-rollover-if-your-application-does-not-support-automatic-rollover) for more information.
326+
327+
1. Run the following script to revert to normal behavior:
328+
329+
```powershell
330+
Update-MsIdApplicationSigningKeyThumbprint -ApplicationId <ApplicationId> -Default
331+
```
293332
294333
## How to perform a manual rollover if your application does not support automatic rollover
295-
If your application does **not** support automatic rollover, you will need to establish a process that periodically monitors Microsoft identity platform's signing keys and performs a manual rollover accordingly. [This GitHub repository](https://github.com/AzureAD/azure-activedirectory-powershell-tokenkey) contains scripts and instructions on how to do this.
334+
If your application doesn't support automatic rollover, you need to establish a process that periodically monitors Microsoft identity platform's signing keys and performs a manual rollover accordingly.
335+
336+
To check and update signing keys with PowerShell, you'll need the [MSIdentityTools](https://www.powershellgallery.com/packages/MSIdentityTools) PowerShell Module.
337+
338+
1. Install the [MSIdentityTools](https://www.powershellgallery.com/packages/MSIdentityTools) PowerShell Module:
339+
340+
```powershell
341+
Install-Module -Name MSIdentityTools
342+
```
343+
344+
1. Get the latest signing key (get the tenant ID from the [Azure portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview)):
345+
346+
```powershell
347+
Get-MsIdSigningKeyThumbprint -Tenant <tenandId> -Latest
348+
```
349+
350+
1. Compare this key against the key your application is currently hardcoded or configured to use.
351+
352+
1. If the latest key is different from the key your application is using, download the latest signing key:
353+
354+
```powershell
355+
Get-MsIdSigningKeyThumbprint -Latest -DownloadPath <DownloadFolderPath>
356+
```
357+
358+
1. Update your application's code or configuration to use the new key.
359+
360+
1. Configure Azure Active Directory to use that latest key with your application (get the app ID from the [portal](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps)):
361+
362+
```powershell
363+
Get-MsIdSigningKeyThumbprint -Latest | Update-MsIdApplicationSigningKeyThumbprint -ApplicationId <ApplicationId>
364+
```
365+
366+
1. Test the web application by signing in to get a new token. The key update change is instantaneous, but make sure you use a new browser session (using, for example, Internet Explorer's "InPrivate," Chrome's "Incognito," or Firefox's "Private" mode) to ensure you are issued a new token.
367+
368+
1. If you experience any issues, revert to the previous key you were using and contact Azure support:
369+
370+
```powershell
371+
Update-MsIdApplicationSigningKeyThumbprint -ApplicationId <ApplicationId> -KeyThumbprint <PreviousKeyThumbprint>
372+
```
373+
374+
1. After you update your application to support manual rollover, revert to normal behavior:
375+
376+
```powershell
377+
Update-MsIdApplicationSigningKeyThumbprint -ApplicationId <ApplicationId> -Default
378+
```

articles/active-directory/develop/v2-oauth2-on-behalf-of-flow.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,16 @@ The OBO flow only works for user principals at this time. A service principal ca
2424

2525
This article describes how to program directly against the protocol in your application. When possible, we recommend you use the supported Microsoft Authentication Libraries (MSAL) instead to [acquire tokens and call secured web APIs](authentication-flows-app-scenarios.md#scenarios-and-supported-authentication-flows). Also take a look at the [sample apps that use MSAL](sample-v2-code.md).
2626

27-
As of May 2018, some implicit-flow derived `id_token` can't be used for OBO flow. Single-page apps (SPAs) should pass an **access** token to a middle-tier confidential client to perform OBO flows instead. For more info about which clients can perform OBO calls, see [limitations](#client-limitations).
28-
2927
[!INCLUDE [try-in-postman-link](includes/try-in-postman-link.md)]
3028

29+
## Client limitations
30+
31+
As of May 2018, some implicit-flow derived `id_token` can't be used for OBO flow. Single-page apps (SPAs) should pass an **access** token to a middle-tier confidential client to perform OBO flows instead.
32+
33+
If a client uses the implicit flow to get an id_token, and that client also has wildcards in a reply URL, the id_token can't be used for an OBO flow. However, access tokens acquired through the implicit grant flow can still be redeemed by a confidential client even if the initiating client has a wildcard reply URL registered.
34+
35+
Additionally, applications with custom signing keys cannot be used as middle-tier API's in the OBO flow (this includes enterprise applications configured for single sign-on). This will result in an error because tokens signed with a key controlled by the client cannot be safely accepted.
36+
3137
## Protocol diagram
3238

3339
Assume that the user has been authenticated on an application using the [OAuth 2.0 authorization code grant flow](v2-oauth2-auth-code-flow.md) or another login flow. At this point, the application has an access token *for API A* (token A) with the user's claims and consent to access the middle-tier web API (API A). Now, API A needs to make an authenticated request to the downstream web API (API B).
@@ -262,10 +268,6 @@ A tenant admin can guarantee that applications have permission to call their req
262268

263269
In some scenarios, you may only have a single pairing of middle-tier and front-end client. In this scenario, you may find it easier to make this a single application, negating the need for a middle-tier application altogether. To authenticate between the front-end and the web API, you can use cookies, an id_token, or an access token requested for the application itself. Then, request consent from this single application to the back-end resource.
264270

265-
## Client limitations
266-
267-
If a client uses the implicit flow to get an id_token, and that client also has wildcards in a reply URL, the id_token can't be used for an OBO flow. However, access tokens acquired through the implicit grant flow can still be redeemed by a confidential client even if the initiating client has a wildcard reply URL registered.
268-
269271
## Next steps
270272

271273
Learn more about the OAuth 2.0 protocol and another way to perform service to service auth using client credentials.

articles/active-directory/governance/entitlement-management-catalog-create.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,8 @@ To include resources in an access package, the resources must exist in a catalog
8080
* Groups can be cloud-created Microsoft 365 Groups or cloud-created Azure AD security groups. Groups that originate in an on-premises Active Directory can't be assigned as resources because their owner or member attributes can't be changed in Azure AD. Groups that originate in Exchange Online as Distribution groups can't be modified in Azure AD either.
8181
* Applications can be Azure AD enterprise applications, which include both software as a service (SaaS) applications and your own applications integrated with Azure AD. For more information on how to select appropriate resources for applications with multiple roles, see [Add resource roles](entitlement-management-access-package-resources.md#add-resource-roles).
8282
* Sites can be SharePoint Online sites or SharePoint Online site collections.
83+
> [!NOTE]
84+
> Search SharePoint Site by site name or an exact URL as the search box is case sensitive.
8385
8486
**Prerequisite roles:** See [Required roles to add resources to a catalog](entitlement-management-delegate.md#required-roles-to-add-resources-to-a-catalog).
8587

@@ -265,4 +267,4 @@ You can also delete a catalog by using Microsoft Graph. A user in an appropriate
265267

266268
## Next steps
267269

268-
[Delegate access governance to access package managers](entitlement-management-delegate-managers.md)
270+
[Delegate access governance to access package managers](entitlement-management-delegate-managers.md)
5.96 KB
Loading

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,8 @@
130130
href: workbook-conditional-access-gap-analyzer.md
131131
- name: Cross-tenant access activity
132132
href: workbook-cross-tenant-access-activity.md
133+
- name: Sign-ins using legacy authentication
134+
href: workbook-legacy authentication.md
133135
- name: Risk analysis
134136
href: workbook-risk-analysis.md
135137
- name: Sensitive Operations Report
Lines changed: 109 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,109 @@
1+
---
2+
3+
title: Sign-ins using legacy authentication workbook in Azure AD | Microsoft Docs
4+
description: Learn how to use the sign-ins using legacy authentication workbook.
5+
services: active-directory
6+
documentationcenter: ''
7+
author: MarkusVi
8+
manager: karenho
9+
editor: ''
10+
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.workload: identity
14+
ms.subservice: report-monitor
15+
ms.date: 03/16/2022
16+
ms.author: markvi
17+
ms.reviewer: besiler
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Sign-ins using legacy authentication workbook
23+
24+
Have you ever wondered how you can determine whether it is safe to turn off legacy authentication in your tenant? The sign-ins using legacy authentication workbook helps you to answer this question.
25+
26+
This article gives you an overview of this workbook.
27+
28+
29+
## Description
30+
31+
![Workbook category](./media/workbook-risk-analysis/workbook-category.png)
32+
33+
Azure AD supports several of the most widely used authentication and authorization protocols including legacy authentication. Legacy authentication refers to basic authentication, which was once a widely used industry-standard method for passing user name and password information through a client to an identity provider.
34+
35+
Examples of applications that commonly or only use legacy authentication are:
36+
37+
- Microsoft Office 2013 or older.
38+
39+
- Apps using legacy auth with mail protocols like POP, IMAP, and SMTP AUTH.
40+
41+
42+
Single-factor authentication (for example, username and password) doesn’t provide the required level of protection for today’s computing environments. Passwords are bad as they are easy to guess and humans are bad at choosing good passwords.
43+
44+
45+
Unfortunately, legacy authentication:
46+
47+
- Does not support multi-factor authentication (MFA) or other strong authentication methods.
48+
49+
- Makes it impossible for your organization to move to passwordless authentication.
50+
51+
To improve the security of your Azure AD tenant and experience of your users, you should disable legacy authentication. However, important user experiences in your tenant might depend on legacy authentication. Before shutting off legacy authentication, you may want to find those cases so you can migrate them to more secure authentication.
52+
53+
The sign-ins using legacy authentication workbook lets you see all legacy authentication sign-ins in your environment so you can find and migrate critical workflows to more secure authentication methods before you shut off legacy authentication.
54+
55+
56+
57+
58+
## Sections
59+
60+
With this workbook, you can distinguish between interactive and non-interactive sign-ins. This workbook highlights which legacy authentication protocols are used throughout your tenant.
61+
62+
The data collection consists of three steps:
63+
64+
1. Select a legacy authentication protocol, and then select an application to filter by users accessing that application.
65+
66+
2. Select a user to see all their legacy authentication sign-ins to the selected app.
67+
68+
3. View all legacy authentication sign-ins for the user to understand how legacy authentication is being used.
69+
70+
71+
72+
73+
74+
75+
## Filters
76+
77+
78+
This workbook supports multiple filters:
79+
80+
81+
- Time range (up to 90 days)
82+
83+
- User principal name
84+
85+
- Application
86+
87+
- Status of the sign-in (success or failure)
88+
89+
90+
![Filter options](./media/workbook-legacy-authentication/filter-options.png)
91+
92+
93+
## Best practices
94+
95+
96+
- **[Enable risky sign-in policies](../identity-protection/concept-identity-protection-policies.md)** - To prompt for multi-factor authentication (MFA) on medium risk or above. Enabling the policy reduces the proportion of active real-time risk detections by allowing legitimate users to self-remediate the risk detections with MFA.
97+
98+
- **[Enable a risky user policy](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-with-conditional-access)** - To enable users to securely remediate their accounts when they are high risk. Enabling the policy reduces the number of active at-risk users in your organization by returning the user’s credentials to a safe state.
99+
100+
101+
102+
103+
104+
## Next steps
105+
106+
- To learn more about identity protection, see [What is identity protection](../identity-protection/overview-identity-protection.md).
107+
108+
- For more information about Azure AD workbooks, see [How to use Azure AD workbooks](howto-use-azure-monitor-workbooks.md).
109+

articles/aks/concepts-clusters-workloads.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You can build and run modern, portable, microservices-based applications, using
3030

3131
As an open platform, Kubernetes allows you to build your applications with your preferred programming language, OS, libraries, or messaging bus. Existing continuous integration and continuous delivery (CI/CD) tools can integrate with Kubernetes to schedule and deploy releases.
3232

33-
AKS provides a managed Kubernetes service that reduces the complexity of deployment and core management tasks, like upgrade coordination. The Azure platform manages the AKS control plane, and you only pay for the AKS nodes that run your applications. AKS is built on top of the open-source Azure Kubernetes Service Engine: [aks-engine][aks-engine].
33+
AKS provides a managed Kubernetes service that reduces the complexity of deployment and core management tasks, like upgrade coordination. The Azure platform manages the AKS control plane, and you only pay for the AKS nodes that run your applications.
3434

3535
## Kubernetes cluster architecture
3636

@@ -296,7 +296,6 @@ This article covers some of the core Kubernetes components and how they apply to
296296
- [Kubernetes / AKS scale][aks-concepts-scale]
297297

298298
<!-- EXTERNAL LINKS -->
299-
[aks-engine]: https://github.com/Azure/aks-engine
300299
[cluster-api-provider-azure]: https://github.com/kubernetes-sigs/cluster-api-provider-azure
301300
[kubernetes-pods]: https://kubernetes.io/docs/concepts/workloads/pods/pod-overview/
302301
[kubernetes-pod-lifecycle]: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/

0 commit comments

Comments
 (0)