You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-number-match.md
+17-7Lines changed: 17 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
4
4
ms.service: active-directory
5
5
ms.subservice: authentication
6
6
ms.topic: conceptual
7
-
ms.date: 02/15/2023
7
+
ms.date: 02/16/2023
8
8
ms.author: justinha
9
9
author: justinha
10
10
ms.collection: M365-identity-device-management
@@ -87,12 +87,12 @@ Prior to the release of NPS extension version 1.2.2216.1 after May 8, 2023, orga
87
87
>[!NOTE]
88
88
>NPS extensions versions earlier than 1.0.1.40 don't support OTP enforced by number matching. These versions will continue to present users with **Approve**/**Deny**.
89
89
90
-
To create the registry key to override the **Approve**/**Deny** options in push notifications and require an OTP instead:
90
+
To create the registry entry to override the **Approve**/**Deny** options in push notifications and require an OTP instead:
91
91
92
92
1. On the NPS Server, open the Registry Editor.
93
93
1. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.
94
-
1.Set the following Key Value Pair:
95
-
Key: OVERRIDE_NUMBER_MATCHING_WITH_OTP
94
+
1.Create the following String/Value pair:
95
+
Name: OVERRIDE_NUMBER_MATCHING_WITH_OTP
96
96
Value = TRUE
97
97
1. Restart the NPS Service.
98
98
@@ -330,12 +330,12 @@ Here are differences in sign-in scenarios that Microsoft Authenticator users wil
330
330
- AD FS adapter will require number matching on [supported versions of Windows Server](#ad-fs-adapter). On earlier versions, users will continue to see the **Approve**/**Deny** experience and won’t see number matching until you upgrade.
331
331
- NPS extension versions beginning 1.2.2131.2 will require users to do number matching. Because the NPS extension can’t show a number, the user will be asked to enter a One-Time Passcode (OTP). The user must have an OTP authentication method such as Microsoft Authenticator or software OATH tokens registered to see this behavior. If the user doesn’t have an OTP method registered, they’ll continue to get the **Approve**/**Deny** experience.
332
332
333
-
To create a registry key that overrides this behavior and prompts users with **Approve**/**Deny**:
333
+
To create a registry entry that overrides this behavior and prompts users with **Approve**/**Deny**:
334
334
335
335
1. On the NPS Server, open the Registry Editor.
336
336
1. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.
337
-
1.Set the following Key Value Pair:
338
-
Key: OVERRIDE_NUMBER_MATCHING_WITH_OTP
337
+
1.Create the following String/Value:
338
+
Name: OVERRIDE_NUMBER_MATCHING_WITH_OTP
339
339
Value = FALSE
340
340
1. Restart the NPS Service.
341
341
@@ -376,6 +376,16 @@ If a user is running an older version of Microsoft Authenticator that doesn't su
376
376
377
377
Older versions of Microsoft Authenticator prompt users to tap and select a number rather than enter the number in Microsoft Authenticator. These authentications won't fail, but Microsoft highly recommends that users upgrade to the latest version of Microsoft Authenticator if they use Android versions prior to 6.2108.5654, or iOS versions prior to 6.5.82, so they can use number match.
378
378
379
+
Minimum Microsoft Authenticator version supporting number matching:
380
+
381
+
- Android: 6.2006.4198
382
+
- iOS: 6.4.12
383
+
384
+
Minimum Microsoft Authenticator version for number matching which prompts to enter a number:
385
+
386
+
- Android 6.2111.7701
387
+
- iOS 6.5.85
388
+
379
389
## Next steps
380
390
381
391
[Authentication methods in Azure Active Directory](concept-authentication-authenticator-app.md)
# Customer intent: As a tenant administrator, I want to make sure that I protect my API endpoint with proper authentication.
15
17
---
16
18
17
19
# Secure your API used an API connector in Azure AD External Identities self-service sign-up user flows
18
20
19
-
When integrating a REST API within an Azure AD external identities self-service sign-up user flow, you must protect your REST API endpoint with authentication. The REST API authentication ensures that only services that have proper credentials, such as Azure AD, can make calls to your endpoint. This article will explore how to secure REST API.
21
+
When integrating a REST API within an Azure AD external identities self-service sign-up user flow, you must protect your REST API endpoint with authentication. The REST API authentication ensures that only services that have proper credentials, such as Azure AD, can make calls to your endpoint. This article explores how to secure REST API.
20
22
21
23
## Prerequisites
22
24
Complete the steps in the [Walkthrough: Add an API connector to a sign-up user flow](self-service-sign-up-add-api-connector.md) guide.
23
25
24
-
You can protect your API endpoint by using either HTTP basic authentication or HTTPS client certificate authentication. In either case, you provide the credentials that Azure AD will use when calling your API endpoint. Your API endpoint then checks the credentials and performs authorization decisions.
25
-
26
+
You can protect your API endpoint by using either HTTP basic authentication or HTTPS client certificate authentication. In either case, you provide the credentials that Azure AD uses when calling your API endpoint. Your API endpoint then checks the credentials and performs authorization decisions.
26
27
27
28
## HTTP basic authentication
28
29
@@ -32,11 +33,12 @@ To configure an API Connector with HTTP basic authentication, follow these steps
32
33
33
34
1. Sign in to the [Azure portal](https://portal.azure.com/).
34
35
2. Under **Azure services**, select **Azure AD**.
35
-
3. Select **API connectors**, and then select the **API Connector** you want to configure.
36
-
4. For the **Authentication type**, select **Basic**.
37
-
5. Provide the **Username**, and **Password** of your REST API endpoint.
38
-
:::image type="content" source="media/secure-api-connector/api-connector-config.png" alt-text="Providing basic authentication configuration for an API connector.":::
39
-
6. Select **Save**.
36
+
1. In the left menu, select **External Identities**.
37
+
1. Select **All API connectors**, and then select the **API Connector** you want to configure.
38
+
1. For the **Authentication type**, select **Basic**.
39
+
1. Provide the **Username**, and **Password** of your REST API endpoint.
40
+
:::image type="content" source="media/secure-api-connector/api-connector-config.png" alt-text="Screenshot of basic authentication configuration for an API connector.":::
41
+
1. Select **Save**.
40
42
41
43
## HTTPS client certificate authentication
42
44
@@ -69,29 +71,30 @@ To configure an API Connector with client certificate authentication, follow the
69
71
70
72
1. Sign in to the [Azure portal](https://portal.azure.com/).
71
73
2. Under **Azure services**, select **Azure AD**.
72
-
3. Select **API connectors**, and then select the **API Connector** you want to configure.
73
-
4. For the **Authentication type**, select **Certificate**.
74
-
5. In the **Upload certificate** box, select your certificate's .pfx file with a private key.
75
-
6. In the **Enter Password** box, type the certificate's password.
76
-
:::image type="content" source="media/secure-api-connector/api-connector-upload-cert.png" alt-text="Providing certificate authentication configuration for an API connector.":::
77
-
7. Select **Save**.
74
+
1. In the left menu, select **External Identities**.
75
+
1. Select **All API connectors**, and then select the **API Connector** you want to configure.
76
+
1. For the **Authentication type**, select **Certificate**.
77
+
1. In the **Upload certificate** box, select your certificate's .pfx file with a private key.
78
+
1. In the **Enter Password** box, type the certificate's password.
79
+
:::image type="content" source="media/secure-api-connector/api-connector-upload-cert.png" alt-text="Screenshot of certificate authentication configuration for an API connector.":::
80
+
1. Select **Save**.
78
81
79
82
### Perform authorization decisions
80
83
Your API must implement the authorization based on sent client certificates in order to protect the API endpoints. For Azure App Service and Azure Functions, see [configure TLS mutual authentication](../../app-service/app-service-web-configure-tls-mutual-auth.md) to learn how to enable and *validate the certificate from your API code*. You can alternatively use Azure API Management as a layer in front of any API service to [check client certificate properties](
81
84
../../api-management/api-management-howto-mutual-certificates-for-clients.md) against desired values.
82
85
83
86
### Renewing certificates
84
-
It's recommended you set reminder alerts for when your certificate will expire. You will need to generate a new certificate and repeat the steps above when used certificates are about to expire. To "roll" the use of a new certificate, your API service can continue to accept old and new certificates for a temporary amount of time while the new certificate is deployed.
87
+
It's recommended you set reminder alerts for when your certificate expires. You'll need to generate a new certificate and repeat the steps above when used certificates are about to expire. To "roll" the use of a new certificate, your API service can continue to accept old and new certificates for a temporary amount of time while the new certificate is deployed.
85
88
86
-
To upload a new certificate to an existing API connector, select the API connector under **API connectors** and click on **Upload new certificate**. The most recently uploaded certificate which is not expired and whose start date has passed will automatically be used by Azure AD.
89
+
To upload a new certificate to an existing API connector, select the API connector under **API connectors** and select on **Upload new certificate**. The most recently uploaded certificate that isn't expired and whose start date has passed will automatically be used by Azure AD.
87
90
88
-
:::image type="content" source="media/secure-api-connector/api-connector-renew-cert.png" alt-text="Providing a new certificate to an API connector when one already exists.":::
91
+
:::image type="content" source="media/secure-api-connector/api-connector-renew-cert.png" alt-text="Screenshot of a new certificate, when one already exists.":::
89
92
90
93
## API key authentication
91
94
92
95
Some services use an "API key" mechanism to obfuscate access to your HTTP endpoints during development by requiring the caller to include a unique key as an HTTP header or HTTP query parameter. For [Azure Functions](../../azure-functions/functions-bindings-http-webhook-trigger.md#authorization-keys), you can accomplish this by including the `code` as a query parameter in the **Endpoint URL** of your API connector. For example, `https://contoso.azurewebsites.net/api/endpoint`<b>`?code=0123456789`</b>).
93
96
94
-
This is not a mechanism that should be used alone in production. Therefore, configuration for basic or certificate authentication is always required. If you do not wish to implement any authentication method (not recommended) for development purposes, you can select 'basic' authentication in the API connector configuration and use temporary values for `username` and `password` that your API can disregard while you implement proper authorization.
97
+
This isn't a mechanism that should be used alone in production. Therefore, configuration for basic or certificate authentication is always required. If you don't wish to implement any authentication method (not recommended) for development purposes, you can select 'basic' authentication in the API connector configuration and use temporary values for `username` and `password` that your API can disregard while you implement proper authorization.
95
98
96
99
## Next steps
97
100
- Get started with our [quickstart samples](code-samples-self-service-sign-up.md#api-connector-azure-function-quickstarts).
Copy file name to clipboardExpand all lines: articles/aks/security-controls-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Azure Policy Regulatory Compliance controls for Azure Kubernetes Service (AKS)
3
3
description: Lists Azure Policy Regulatory Compliance controls available for Azure Kubernetes Service (AKS). These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
Copy file name to clipboardExpand all lines: articles/api-management/security-controls-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Azure Policy Regulatory Compliance controls for Azure API Management
3
3
description: Lists Azure Policy Regulatory Compliance controls available for Azure API Management. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
Copy file name to clipboardExpand all lines: articles/app-service/security-controls-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Azure Policy Regulatory Compliance controls for Azure App Service
3
3
description: Lists Azure Policy Regulatory Compliance controls available for Azure App Service. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
Copy file name to clipboardExpand all lines: articles/automation/security-controls-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Azure Policy Regulatory Compliance controls for Azure Automation
3
3
description: Lists Azure Policy Regulatory Compliance controls available for Azure Automation. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
Copy file name to clipboardExpand all lines: articles/azure-app-configuration/security-controls-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Azure Policy Regulatory Compliance controls for Azure App Configuration
3
3
description: Lists Azure Policy Regulatory Compliance controls available for Azure App Configuration. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
description: Lists Azure Policy Regulatory Compliance controls available for Azure Arc-enabled servers (preview). These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
Copy file name to clipboardExpand all lines: articles/azure-cache-for-redis/security-controls-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Azure Policy Regulatory Compliance controls for Azure Cache for Redis
3
3
description: Lists Azure Policy Regulatory Compliance controls available for Azure Cache for Redis. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
0 commit comments