Skip to content

Commit 74bbe74

Browse files
authored
Merge pull request #207051 from MicrosoftDocs/main
8/05 AM Publish
2 parents 588d8c1 + 429347c commit 74bbe74

File tree

68 files changed

+285
-165
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

68 files changed

+285
-165
lines changed

articles/active-directory-b2c/contentdefinitions.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -162,19 +162,19 @@ The following example shows the content definition identifiers and the correspon
162162
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:providerselection:1.2.1</DataUri>
163163
</ContentDefinition>
164164
<ContentDefinition Id="api.signuporsignin">
165-
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:unifiedssp:2.1.5</DataUri>
165+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:unifiedssp:2.1.7</DataUri>
166166
</ContentDefinition>
167167
<ContentDefinition Id="api.selfasserted">
168-
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.7</DataUri>
168+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.14</DataUri>
169169
</ContentDefinition>
170170
<ContentDefinition Id="api.selfasserted.profileupdate">
171-
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.7</DataUri>
171+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.14</DataUri>
172172
</ContentDefinition>
173173
<ContentDefinition Id="api.localaccountsignup">
174-
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.7</DataUri>
174+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.14</DataUri>
175175
</ContentDefinition>
176176
<ContentDefinition Id="api.localaccountpasswordreset">
177-
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.7</DataUri>
177+
<DataUri>urn:com:microsoft:aad:b2c:elements:contract:selfasserted:2.1.14</DataUri>
178178
</ContentDefinition>
179179
<ContentDefinition Id="api.phonefactor">
180180
<RecoveryUri>~/common/default_page_error.html</RecoveryUri>

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 06/29/2022
9+
ms.date: 08/05/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -192,6 +192,10 @@ Restrictions when you configure a policy using the password change control.
192192

193193
If your organization has created terms of use, other options may be visible under grant controls. These options allow administrators to require acknowledgment of terms of use as a condition of accessing the resources protected by the policy. More information about terms of use can be found in the article, [Azure Active Directory terms of use](terms-of-use.md).
194194

195+
### Custom controls (preview)
196+
197+
Custom controls is a preview capability of the Azure Active Directory. When using custom controls, your users are redirected to a compatible service to satisfy authentication requirements outside of Azure Active Directory. For more information, check out the [Custom controls](controls.md) article.
198+
195199
## Next steps
196200

197201
- [Conditional Access: Session controls](concept-conditional-access-session.md)

articles/active-directory/conditional-access/concept-conditional-access-policies.md

Lines changed: 16 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 01/11/2022
9+
ms.date: 08/05/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -29,18 +29,21 @@ If a policy where "Require one of the selected controls" is selected, we prompt
2929

3030
All policies are enforced in two phases:
3131

32-
- Phase 1: Collect session details
32+
- **Phase 1**: Collect session details
3333
- Gather session details, like network location and device identity that will be necessary for policy evaluation.
3434
- Phase 1 of policy evaluation occurs for enabled policies and policies in [report-only mode](concept-conditional-access-report-only.md).
35-
- Phase 2: Enforcement
35+
- **Phase 2**: Enforcement
3636
- Use the session details gathered in phase 1 to identify any requirements that haven't been met.
3737
- If there's a policy that is configured to block access, with the block grant control, enforcement will stop here and the user will be blocked.
3838
- The user will be prompted to complete more grant control requirements that weren't satisfied during phase 1 in the following order, until policy is satisfied:
39-
- Multi-factor authentication​
40-
- Approved client app/app protection policy​
41-
- Managed device (compliant or hybrid Azure AD join)​
42-
- Terms of use
43-
- Custom controls
39+
- [Multi-factor authentication​](concept-conditional-access-grant.md#require-multifactor-authentication)
40+
- [Device to be marked as compliant](./concept-conditional-access-grant.md#require-device-to-be-marked-as-compliant)
41+
- [Hybrid Azure AD joined device](./concept-conditional-access-grant.md#require-hybrid-azure-ad-joined-device)
42+
- [Approved client app](./concept-conditional-access-grant.md#require-approved-client-app)
43+
- [App protection policy](./concept-conditional-access-grant.md#require-app-protection-policy)
44+
- [Password change](./concept-conditional-access-grant.md#require-password-change)
45+
- [Terms of use](concept-conditional-access-grant.md#terms-of-use)
46+
- [Custom controls](./concept-conditional-access-grant.md#custom-controls-preview)
4447
- Once all grant controls have been satisfied, apply session controls (App Enforced, Microsoft Defender for Cloud Apps, and token Lifetime)
4548
- Phase 2 of policy evaluation occurs for all enabled policies.
4649

@@ -76,7 +79,7 @@ Location data is provided by IP geolocation data. Administrators can choose to d
7679

7780
#### Client apps
7881

79-
By default, all newly created Conditional Access policies will apply to all client app types even if the client apps condition isn't configured.
82+
The software the user is employing to access the cloud app. For example, 'Browser', and 'Mobile apps and desktop clients'. By default, all newly created Conditional Access policies will apply to all client app types even if the client apps condition isn't configured.
8083

8184
The behavior of the client apps condition was updated in August 2020. If you have existing Conditional Access policies, they'll remain unchanged. However, if you select on an existing policy, the configure toggle has been removed and the client apps the policy applies to are selected.
8285

@@ -104,7 +107,7 @@ Block access does just that, it will block access under the specified assignment
104107

105108
The grant control can trigger enforcement of one or more controls.
106109

107-
- Require multi-factor authentication (Azure AD Multi-Factor Authentication)
110+
- Require multi-factor authentication
108111
- Require device to be marked as compliant (Intune)
109112
- Require Hybrid Azure AD joined device
110113
- Require approved client app
@@ -123,7 +126,7 @@ Administrators can choose to require one of the previous controls or all selecte
123126

124127
- Use app enforced restrictions
125128
- Currently works with Exchange Online and SharePoint Online only.
126-
- Passes device information to allow control of experience granting full or limited access.
129+
- Passes device information to allow control of experience granting full or limited access.
127130
- Use Conditional Access App Control
128131
- Uses signals from Microsoft Defender for Cloud Apps to do things like:
129132
- Block download, cut, copy, and print of sensitive documents.
@@ -133,6 +136,8 @@ Administrators can choose to require one of the previous controls or all selecte
133136
- Ability to change the default sign in frequency for modern authentication.
134137
- Persistent browser session
135138
- Allows users to remain signed in after closing and reopening their browser window.
139+
- Customize continuous access evaluation
140+
- Disable resilience defaults
136141

137142
## Simple policies
138143

articles/active-directory/conditional-access/concept-conditional-access-users-groups.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 06/01/2022
9+
ms.date: 08/05/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -33,9 +33,9 @@ The following options are available to include when creating a Conditional Acces
3333
- All users that exist in the directory including B2B guests.
3434
- Select users and groups
3535
- All guest and external users
36-
- This selection includes any B2B guests and external users including any user with the `user type` attribute set to `guest`. This selection also applies to any external user signed-in from a different organization like a Cloud Solution Provider (CSP).
36+
- This selection includes any [B2B guests and external users](../external-identities/external-identities-overview.md) including any user with the `user type` attribute set to `guest`. This selection also applies to any external user signed-in from a different organization like a Cloud Solution Provider (CSP).
3737
- Directory roles
38-
- Allows administrators to select specific built-in Azure AD directory roles used to determine policy assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role. Other role types aren't supported, including administrative unit-scoped roles and custom roles.
38+
- Allows administrators to select specific [built-in Azure AD directory roles](../roles/permissions-reference.md) used to determine policy assignment. For example, organizations may create a more restrictive policy on users assigned the global administrator role. Other role types aren't supported, including administrative unit-scoped roles and custom roles.
3939
- Users and groups
4040
- Allows targeting of specific sets of users. For example, organizations can select a group that contains all members of the HR department when an HR app is selected as the cloud app. A group can be any type of user group in Azure AD, including dynamic or assigned security and distribution groups. Policy will be applied to nested users and groups.
4141

articles/active-directory/conditional-access/overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: overview
9-
ms.date: 04/15/2022
9+
ms.date: 08/05/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -55,8 +55,8 @@ Common signals that Conditional Access can take in to account when making a poli
5555
- Application
5656
- Users attempting to access specific applications can trigger different Conditional Access policies.
5757
- Real-time and calculated risk detection
58-
- Signals integration with Azure AD Identity Protection allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to change their password, do multi-factor authentication to reduce their risk level, or block access until an administrator takes manual action.
59-
- Microsoft Defender for Cloud Apps
58+
- Signals integration with [Azure AD Identity Protection](../identity-protection/overview-identity-protection.md) allows Conditional Access policies to identify risky sign-in behavior. Policies can then force users to change their password, do multi-factor authentication to reduce their risk level, or block access until an administrator takes manual action.
59+
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)
6060
- Enables user application access and sessions to be monitored and controlled in real time, increasing visibility and control over access to and activities done within your cloud environment.
6161

6262
## Common decisions

articles/active-directory/conditional-access/require-tou.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: conditional-access
77
ms.topic: quickstart
8-
ms.date: 11/21/2019
8+
ms.date: 08/05/2022
99
ms.author: joflore
1010
author: MicrosoftGuyJFlo
1111
manager: karenhoran
@@ -52,11 +52,11 @@ This section provides you with the steps to create a sample ToU. When you create
5252
1. In Microsoft Word, create a new document.
5353
1. Type **My terms of use**, and then save the document on your computer as **mytou.pdf**.
5454
1. Sign in to your [Azure portal](https://portal.azure.com) as global administrator, security administrator, or a Conditional Access administrator.
55-
1. In the Azure portal, on the left navbar, click **Azure Active Directory**.
55+
1. Search for and select **Azure Active Directory**. From the menu on the left-hand side select **Security**.
5656

5757
![Azure Active Directory](./media/require-tou/02.png)
5858

59-
1. On the **Azure Active Directory** page, in the **Security** section, click **Conditional Access**.
59+
1. Select **Conditional Access**.
6060

6161
![Conditional Access](./media/require-tou/03.png)
6262

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: how-to
8-
ms.date: 06/30/2022
8+
ms.date: 08/05/2022
99

1010
ms.author: mimart
1111
author: msmimart
@@ -18,12 +18,16 @@ ms.collection: M365-identity-device-management
1818

1919
Azure AD organizations can use External Identities cross-tenant access settings to manage how they collaborate with other Azure AD organizations and other Microsoft Azure clouds through B2B collaboration and [B2B direct connect](cross-tenant-access-settings-b2b-direct-connect.md). [Cross-tenant access settings](cross-tenant-access-settings-b2b-collaboration.md) give you granular control over how external Azure AD organizations collaborate with you (inbound access) and how your users collaborate with external Azure AD organizations (outbound access). These settings also let you trust multi-factor authentication (MFA) and device claims ([compliant claims and hybrid Azure AD joined claims](../conditional-access/howto-conditional-access-policy-compliant-device.md)) from other Azure AD organizations.
2020

21-
This article describes cross-tenant access settings, which are used to manage B2B collaboration and B2B direct connect with external Azure AD organizations, including across Microsoft clouds. Additional settings are available for B2B collaboration with non-Azure AD identities (for example, social identities or non-IT managed external accounts). These [external collaboration settings](external-collaboration-settings-configure.md) include options for restricting guest user access, specifying who can invite guests, and allowing or blocking domains.
22-
23-
![Overview diagram of cross-tenant access settings.](media/cross-tenant-access-overview/cross-tenant-access-settings-overview.png)
21+
This article describes cross-tenant access settings, which are used to manage B2B collaboration and B2B direct connect with external Azure AD organizations, including across Microsoft clouds. More settings are available for B2B collaboration with non-Azure AD identities (for example, social identities or non-IT managed external accounts). These [external collaboration settings](external-collaboration-settings-configure.md) include options for restricting guest user access, specifying who can invite guests, and allowing or blocking domains.
2422

2523
## Manage external access with inbound and outbound settings
2624

25+
The external identities cross-tenant access settings manage how you collaborate with other Azure AD organizations. These settings determine both the level of inbound access users in external Azure AD organizations have to your resources, and the level of outbound access your users have to external organizations.
26+
27+
The following diagram shows the cross-tenant access inbound and outbound settings. The **Resource Azure AD tenant** is the tenant containing the resources to be shared. In the case of B2B collaboration, the resource tenant is the inviting tenant (for example, your corporate tenant, where you want to invite the external users to). The **User's home Azure AD tenant** is the tenant where the external users are managed.
28+
29+
![Overview diagram of cross-tenant access settings.](media/cross-tenant-access-overview/cross-tenant-access-settings-overview.png)
30+
2731
By default, B2B collaboration with other Azure AD organizations is enabled, and B2B direct connect is blocked. But the following comprehensive admin settings let you manage both of these features.
2832

2933
- **Outbound access settings** control whether your users can access resources in an external organization. You can apply these settings to everyone, or specify individual users, groups, and applications.
@@ -36,7 +40,7 @@ By default, B2B collaboration with other Azure AD organizations is enabled, and
3640

3741
The default cross-tenant access settings apply to all Azure AD organizations external to your tenant, except those for which you've configured organizational settings. You can change your default settings, but the initial default settings for B2B collaboration and B2B direct connect are as follows:
3842

39-
- **B2B collaboration**: All your internal users are enabled for B2B collaboration by default. This means your users can invite external guests to access your resources and they can be invited to external organizations as guests. MFA and device claims from other Azure AD organizations aren't trusted.
43+
- **B2B collaboration**: All your internal users are enabled for B2B collaboration by default. This setting means your users can invite external guests to access your resources and they can be invited to external organizations as guests. MFA and device claims from other Azure AD organizations aren't trusted.
4044

4145
- **B2B direct connect**: No B2B direct connect trust relationships are established by default. Azure AD blocks all inbound and outbound B2B direct connect capabilities for all external Azure AD tenants.
4246

@@ -73,7 +77,7 @@ Microsoft cloud settings let you collaborate with organizations from different M
7377
To set up B2B collaboration, both organizations configure their Microsoft cloud settings to enable the partner's cloud. Then each organization uses the partner's tenant ID to find and add the partner to their organizational settings. From there, each organization can allow their default cross-tenant access settings apply to the partner, or they can configure partner-specific inbound and outbound settings. After you establish B2B collaboration with a partner in another cloud, you'll be able to:
7478

7579
- Use B2B collaboration to invite a user in the partner tenant to access resources in your organization, including web line-of-business apps, SaaS apps, and SharePoint Online sites, documents, and files.
76-
- Use B2B collaboration to [share Power BI content to a user in the partner tenant](https://docs.microsoft.com/power-bi/enterprise/service-admin-azure-ad-b2b#cross-cloud-b2b).
80+
- Use B2B collaboration to [share Power BI content to a user in the partner tenant](/power-bi/enterprise/service-admin-azure-ad-b2b#cross-cloud-b2b).
7781
- Apply Conditional Access policies to the B2B collaboration user and opt to trust device claims (compliant claims and hybrid Azure AD joined claims) from the user’s home tenant.
7882

7983
> [!NOTE]
@@ -92,7 +96,7 @@ To collaborate with a partner tenant in a different Microsoft Azure cloud, both
9296
9397
- To configure cross-tenant access settings in the Azure portal, you'll need an account with a Global administrator or Security administrator role.
9498

95-
- To configure trust settings or apply access settings to specific users, groups, or applications, you'll need an Azure AD Premium P1 license.
99+
- To configure trust settings or apply access settings to specific users, groups, or applications, you'll need an Azure AD Premium P1 license. The license is required on the tenant that you configure. For B2B direct connect, where mutual trust relationship with another Azure AD organization is required, you'll need an Azure AD Premium P1 license in both tenants.
96100

97101
- Cross-tenant access settings are used to manage B2B collaboration and B2B direct connect with other Azure AD organizations. For B2B collaboration with non-Azure AD identities (for example, social identities or non-IT managed external accounts), use [external collaboration settings](external-collaboration-settings-configure.md). External collaboration settings include B2B collaboration options for restricting guest user access, specifying who can invite guests, and allowing or blocking domains.
98102

@@ -159,7 +163,7 @@ If your organization exports sign-in logs to a Security Information and Event Ma
159163

160164
The Azure AD audit logs capture all activity around cross-tenant access setting changes and activity. To audit changes to your cross-tenant access settings, use the **category** of ***CrossTenantAccessSettings*** to filter all activity to show changes to cross-tenant access settings.
161165

162-
![Audit logs for cross-tenant access settings.](media/cross-tenant-access-overview/cross-tenant-access-settings-audit-logs.png)
166+
:::image type="content" source="media/cross-tenant-access-overview/cross-tenant-access-settings-audit-logs.png" alt-text="Screenshot of the audit logs for cross-tenant access settings." lightbox="media/cross-tenant-access-overview/cross-tenant-access-settings-audit-logs.png":::
163167

164168
## Next steps
165169

0 commit comments

Comments
 (0)