Skip to content

Commit 7876215

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into heidist-fix
2 parents 46fd58f + 4dfaf6d commit 7876215

17 files changed

+333
-422
lines changed

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -79,17 +79,17 @@ Azure AD CBA is an MFA (Multi factor authentication) capable method, that is Azu
7979
If CBA enabled user only has a Single Factor (SF) certificate and need MFA
8080
1. Use Password + SF certificate.
8181
1. Issue Temporary Access Pass (TAP)
82-
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
82+
1. Admin adds Phone Number to user account and allows Voice/text message method for user.
8383

8484
If CBA enabled user has not yet been issued a certificate and need MFA
8585
1. Issue Temporary Access Pass (TAP)
86-
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
86+
1. Admin adds Phone Number to user account and allows Voice/text message method for user.
8787

8888
If CBA enabled user cannot use MF cert (such as on mobile device without smart card support) and need MFA
8989
1. Issue Temporary Access Pass (TAP)
9090
1. User Register another MFA method (when user can use MF cert)
9191
1. Use Password + MF cert (when user can use MF cert)
92-
1. Admin adds Phone Number to user account and allows Voice/SMS method for user
92+
1. Admin adds Phone Number to user account and allows Voice/text message method for user
9393

9494

9595
## MFA with Single-factor certificate-based authentication

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The following table provides a list of the features that are available in the va
4444
| Protect Azure AD tenant admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) ||||
4545
| Mobile app as a second factor ||||||
4646
| Phone call as a second factor | | ||||
47-
| SMS as a second factor | |||||
47+
| Text message as a second factor | |||||
4848
| Admin control over verification methods | |||||
4949
| Fraud alert | | | |||
5050
| MFA Reports | | | |||
@@ -70,7 +70,7 @@ Our recommended approach to enforce MFA is using [Conditional Access](../conditi
7070
| Configuration flexibility | || |
7171
| **Functionality** |
7272
| Exempt users from the policy | |||
73-
| Authenticate by phone call or SMS ||||
73+
| Authenticate by phone call or text message ||||
7474
| Authenticate by Microsoft Authenticator and Software tokens ||||
7575
| Authenticate by FIDO2, Windows Hello for Business, and Hardware tokens | |||
7676
| Blocks legacy authentication protocols ||||

articles/active-directory/authentication/concept-mfa-regional-opt-in.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/11/2023
9+
ms.date: 09/12/2023
1010

1111
author: aloom3
1212
ms.author: justinha
@@ -24,12 +24,12 @@ As a protection for our customers, Microsoft doesn't automatically support telep
2424

2525
In today's digital world, telecommunication services have become ingrained into our lives. But advancements come with a risk of fraudulent activities. International Revenue Share Fraud (IRSF) is a threat with severe financial implications that also makes using services more difficult. Let's look at IRSF fraud more in-depth.
2626

27-
IRSF is a type of telephony fraud where criminals exploit the billing system of telecommunication services providers to make profit for themselves. Bad actors gain unauthorized access to a telecommunication network and divert traffic to those networks to skim profit for every transaction that is sent to that network. To divert traffic, bad actors steal existing usernames and passwords, create new usernames and passwords, or try a host of other things to send SMS messages and voice calls through their telecommunication network. Bad actors take advantage of multifactor authentication screens, which require an SMS or voice call before a user can access their account. This activity causes exorbitant charges and makes services unreliable for our customers, causing downtime, and system errors.
27+
IRSF is a type of telephony fraud where criminals exploit the billing system of telecommunication services providers to make profit for themselves. Bad actors gain unauthorized access to a telecommunication network and divert traffic to those networks to skim profit for every transaction that is sent to that network. To divert traffic, bad actors steal existing usernames and passwords, create new usernames and passwords, or try a host of other things to send text message messages and voice calls through their telecommunication network. Bad actors take advantage of multifactor authentication screens, which require a text message or voice call before a user can access their account. This activity causes exorbitant charges and makes services unreliable for our customers, causing downtime, and system errors.
2828

2929
Here's how an IRSF attack may happen:
3030

3131
1. A bad actor first gets premium rate phone numbers and registers them.
32-
1. A bad actor uses automated scripts to request voice calls or SMS messages. The bad actor is colluding with number providers and the telecommunication network to drive more traffic to those services. The bad actor skims some of the profits of the increased traffic.
32+
1. A bad actor uses automated scripts to request voice calls or text messages. The bad actor is colluding with number providers and the telecommunication network to drive more traffic to those services. The bad actor skims some of the profits of the increased traffic.
3333
1. A bad actor will hop around different region codes to continue to drive traffic and make it hard for them to get caught.
3434

3535
The most common way to conduct IRSF is through an end-user experience that requires a two-factor authentication code. Bad actors add those premium rate phone numbers and pump traffic to them by requesting two-factor authentication codes. This activity results in revenue-skimming, and can lead to billions of dollars in loss.
@@ -46,7 +46,7 @@ For SMS verification, the following region codes require an opt-in.
4646
| 998 | Uzbek |
4747

4848
## Voice verification
49-
For Voice verification, the following region codes require an opt-in.
49+
For voice verification, the following region codes require an opt-in.
5050

5151
| Region Code | Region Name |
5252
|:----------- |:---------------------------------------------- |
169 KB
Loading

0 commit comments

Comments
 (0)