Skip to content

Commit 7497710

Browse files
committed
2 parents f213384 + 1a5ae19 commit 7497710

File tree

570 files changed

+4807
-1060
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

570 files changed

+4807
-1060
lines changed

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 17 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 02/15/2023
7+
ms.date: 02/16/2023
88
ms.author: justinha
99
author: justinha
1010
ms.collection: M365-identity-device-management
@@ -87,12 +87,12 @@ Prior to the release of NPS extension version 1.2.2216.1 after May 8, 2023, orga
8787
>[!NOTE]
8888
>NPS extensions versions earlier than 1.0.1.40 don't support OTP enforced by number matching. These versions will continue to present users with **Approve**/**Deny**.
8989
90-
To create the registry key to override the **Approve**/**Deny** options in push notifications and require an OTP instead:
90+
To create the registry entry to override the **Approve**/**Deny** options in push notifications and require an OTP instead:
9191

9292
1. On the NPS Server, open the Registry Editor.
9393
1. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.
94-
1. Set the following Key Value Pair:
95-
Key: OVERRIDE_NUMBER_MATCHING_WITH_OTP
94+
1. Create the following String/Value pair:
95+
Name: OVERRIDE_NUMBER_MATCHING_WITH_OTP
9696
Value = TRUE
9797
1. Restart the NPS Service.
9898

@@ -330,12 +330,12 @@ Here are differences in sign-in scenarios that Microsoft Authenticator users wil
330330
- AD FS adapter will require number matching on [supported versions of Windows Server](#ad-fs-adapter). On earlier versions, users will continue to see the **Approve**/**Deny** experience and won’t see number matching until you upgrade.
331331
- NPS extension versions beginning 1.2.2131.2 will require users to do number matching. Because the NPS extension can’t show a number, the user will be asked to enter a One-Time Passcode (OTP). The user must have an OTP authentication method such as Microsoft Authenticator or software OATH tokens registered to see this behavior. If the user doesn’t have an OTP method registered, they’ll continue to get the **Approve**/**Deny** experience.
332332

333-
To create a registry key that overrides this behavior and prompts users with **Approve**/**Deny**:
333+
To create a registry entry that overrides this behavior and prompts users with **Approve**/**Deny**:
334334

335335
1. On the NPS Server, open the Registry Editor.
336336
1. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.
337-
1. Set the following Key Value Pair:
338-
Key: OVERRIDE_NUMBER_MATCHING_WITH_OTP
337+
1. Create the following String/Value:
338+
Name: OVERRIDE_NUMBER_MATCHING_WITH_OTP
339339
Value = FALSE
340340
1. Restart the NPS Service.
341341

@@ -376,6 +376,16 @@ If a user is running an older version of Microsoft Authenticator that doesn't su
376376

377377
Older versions of Microsoft Authenticator prompt users to tap and select a number rather than enter the number in Microsoft Authenticator. These authentications won't fail, but Microsoft highly recommends that users upgrade to the latest version of Microsoft Authenticator if they use Android versions prior to 6.2108.5654, or iOS versions prior to 6.5.82, so they can use number match.
378378

379+
Minimum Microsoft Authenticator version supporting number matching:
380+
381+
- Android: 6.2006.4198
382+
- iOS: 6.4.12
383+
384+
Minimum Microsoft Authenticator version for number matching which prompts to enter a number:
385+
386+
- Android 6.2111.7701
387+
- iOS 6.5.85
388+
379389
## Next steps
380390

381391
[Authentication methods in Azure Active Directory](concept-authentication-authenticator-app.md)
-7.83 KB
Loading

articles/active-directory/external-identities/self-service-sign-up-secure-api-connector.md

Lines changed: 23 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,24 +5,25 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: article
8-
ms.date: 07/16/2021
8+
ms.date: 02/15/2023
99

1010
ms.author: mimart
1111
author: msmimart
1212
manager: celestedg
1313
ms.custom: "it-pro"
14-
ms.collection: M365-identity-device-management
14+
ms.collection: engagement-fy23, M365-identity-device-management
15+
16+
# Customer intent: As a tenant administrator, I want to make sure that I protect my API endpoint with proper authentication.
1517
---
1618

1719
# Secure your API used an API connector in Azure AD External Identities self-service sign-up user flows
1820

19-
When integrating a REST API within an Azure AD external identities self-service sign-up user flow, you must protect your REST API endpoint with authentication. The REST API authentication ensures that only services that have proper credentials, such as Azure AD, can make calls to your endpoint. This article will explore how to secure REST API.
21+
When integrating a REST API within an Azure AD external identities self-service sign-up user flow, you must protect your REST API endpoint with authentication. The REST API authentication ensures that only services that have proper credentials, such as Azure AD, can make calls to your endpoint. This article explores how to secure REST API.
2022

2123
## Prerequisites
2224
Complete the steps in the [Walkthrough: Add an API connector to a sign-up user flow](self-service-sign-up-add-api-connector.md) guide.
2325

24-
You can protect your API endpoint by using either HTTP basic authentication or HTTPS client certificate authentication. In either case, you provide the credentials that Azure AD will use when calling your API endpoint. Your API endpoint then checks the credentials and performs authorization decisions.
25-
26+
You can protect your API endpoint by using either HTTP basic authentication or HTTPS client certificate authentication. In either case, you provide the credentials that Azure AD uses when calling your API endpoint. Your API endpoint then checks the credentials and performs authorization decisions.
2627

2728
## HTTP basic authentication
2829

@@ -32,11 +33,12 @@ To configure an API Connector with HTTP basic authentication, follow these steps
3233

3334
1. Sign in to the [Azure portal](https://portal.azure.com/).
3435
2. Under **Azure services**, select **Azure AD**.
35-
3. Select **API connectors**, and then select the **API Connector** you want to configure.
36-
4. For the **Authentication type**, select **Basic**.
37-
5. Provide the **Username**, and **Password** of your REST API endpoint.
38-
:::image type="content" source="media/secure-api-connector/api-connector-config.png" alt-text="Providing basic authentication configuration for an API connector.":::
39-
6. Select **Save**.
36+
1. In the left menu, select **External Identities**.
37+
1. Select **All API connectors**, and then select the **API Connector** you want to configure.
38+
1. For the **Authentication type**, select **Basic**.
39+
1. Provide the **Username**, and **Password** of your REST API endpoint.
40+
:::image type="content" source="media/secure-api-connector/api-connector-config.png" alt-text="Screenshot of basic authentication configuration for an API connector.":::
41+
1. Select **Save**.
4042

4143
## HTTPS client certificate authentication
4244

@@ -69,29 +71,30 @@ To configure an API Connector with client certificate authentication, follow the
6971

7072
1. Sign in to the [Azure portal](https://portal.azure.com/).
7173
2. Under **Azure services**, select **Azure AD**.
72-
3. Select **API connectors**, and then select the **API Connector** you want to configure.
73-
4. For the **Authentication type**, select **Certificate**.
74-
5. In the **Upload certificate** box, select your certificate's .pfx file with a private key.
75-
6. In the **Enter Password** box, type the certificate's password.
76-
:::image type="content" source="media/secure-api-connector/api-connector-upload-cert.png" alt-text="Providing certificate authentication configuration for an API connector.":::
77-
7. Select **Save**.
74+
1. In the left menu, select **External Identities**.
75+
1. Select **All API connectors**, and then select the **API Connector** you want to configure.
76+
1. For the **Authentication type**, select **Certificate**.
77+
1. In the **Upload certificate** box, select your certificate's .pfx file with a private key.
78+
1. In the **Enter Password** box, type the certificate's password.
79+
:::image type="content" source="media/secure-api-connector/api-connector-upload-cert.png" alt-text="Screenshot of certificate authentication configuration for an API connector.":::
80+
1. Select **Save**.
7881

7982
### Perform authorization decisions
8083
Your API must implement the authorization based on sent client certificates in order to protect the API endpoints. For Azure App Service and Azure Functions, see [configure TLS mutual authentication](../../app-service/app-service-web-configure-tls-mutual-auth.md) to learn how to enable and *validate the certificate from your API code*. You can alternatively use Azure API Management as a layer in front of any API service to [check client certificate properties](
8184
../../api-management/api-management-howto-mutual-certificates-for-clients.md) against desired values.
8285

8386
### Renewing certificates
84-
It's recommended you set reminder alerts for when your certificate will expire. You will need to generate a new certificate and repeat the steps above when used certificates are about to expire. To "roll" the use of a new certificate, your API service can continue to accept old and new certificates for a temporary amount of time while the new certificate is deployed.
87+
It's recommended you set reminder alerts for when your certificate expires. You'll need to generate a new certificate and repeat the steps above when used certificates are about to expire. To "roll" the use of a new certificate, your API service can continue to accept old and new certificates for a temporary amount of time while the new certificate is deployed.
8588

86-
To upload a new certificate to an existing API connector, select the API connector under **API connectors** and click on **Upload new certificate**. The most recently uploaded certificate which is not expired and whose start date has passed will automatically be used by Azure AD.
89+
To upload a new certificate to an existing API connector, select the API connector under **API connectors** and select on **Upload new certificate**. The most recently uploaded certificate that isn't expired and whose start date has passed will automatically be used by Azure AD.
8790

88-
:::image type="content" source="media/secure-api-connector/api-connector-renew-cert.png" alt-text="Providing a new certificate to an API connector when one already exists.":::
91+
:::image type="content" source="media/secure-api-connector/api-connector-renew-cert.png" alt-text="Screenshot of a new certificate, when one already exists.":::
8992

9093
## API key authentication
9194

9295
Some services use an "API key" mechanism to obfuscate access to your HTTP endpoints during development by requiring the caller to include a unique key as an HTTP header or HTTP query parameter. For [Azure Functions](../../azure-functions/functions-bindings-http-webhook-trigger.md#authorization-keys), you can accomplish this by including the `code` as a query parameter in the **Endpoint URL** of your API connector. For example, `https://contoso.azurewebsites.net/api/endpoint`<b>`?code=0123456789`</b>).
9396

94-
This is not a mechanism that should be used alone in production. Therefore, configuration for basic or certificate authentication is always required. If you do not wish to implement any authentication method (not recommended) for development purposes, you can select 'basic' authentication in the API connector configuration and use temporary values for `username` and `password` that your API can disregard while you implement proper authorization.
97+
This isn't a mechanism that should be used alone in production. Therefore, configuration for basic or certificate authentication is always required. If you don't wish to implement any authentication method (not recommended) for development purposes, you can select 'basic' authentication in the API connector configuration and use temporary values for `username` and `password` that your API can disregard while you implement proper authorization.
9598

9699
## Next steps
97100
- Get started with our [quickstart samples](code-samples-self-service-sign-up.md#api-connector-azure-function-quickstarts).

articles/aks/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure Kubernetes Service (AKS)
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure Kubernetes Service (AKS). These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 01/05/2023
4+
ms.date: 02/14/2023
55
ms.topic: sample
66
ms.service: azure-kubernetes-service
77
ms.custom: subject-policy-compliancecontrols

articles/api-management/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure API Management
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure API Management. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 01/05/2023
4+
ms.date: 02/14/2023
55
ms.topic: sample
66
author: dlepow
77
ms.author: danlep

articles/app-service/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure App Service
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure App Service. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 01/05/2023
4+
ms.date: 02/14/2023
55
ms.topic: sample
66
ms.service: app-service
77
ms.custom: subject-policy-compliancecontrols

articles/automation/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure Automation
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure Automation. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 01/05/2023
4+
ms.date: 02/14/2023
55
ms.topic: sample
66
ms.service: automation
77
ms.custom: subject-policy-compliancecontrols

articles/azure-app-configuration/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure App Configuration
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure App Configuration. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 01/05/2023
4+
ms.date: 02/14/2023
55
ms.topic: sample
66
author: maud-lv
77
ms.author: malev

articles/azure-arc/servers/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure Arc-enabled servers (preview)
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure Arc-enabled servers (preview). These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 01/05/2023
4+
ms.date: 02/14/2023
55
ms.topic: sample
66
ms.custom: subject-policy-compliancecontrols
77
---

articles/azure-cache-for-redis/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure Cache for Redis
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure Cache for Redis. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 01/05/2023
4+
ms.date: 02/14/2023
55
ms.topic: sample
66
author: flang-msft
77
ms.author: franlanglois

0 commit comments

Comments
 (0)