You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/certificate-based-authentication-faq.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -135,7 +135,7 @@ sections:
135
135
- question: |
136
136
CertificateUserIds update fails with value already there. How can an admin query all the user objects with the same value?
137
137
answer: |
138
-
Tenant admins can run MS Graph queries to find all the users with a given certificateUserId value. More information can be found at [CertificateUserIds graph queries](concept-certificate-based-authentication-certificateuserids.md#look-up-certificateuserids-using-microsoft-graph-queries)
138
+
Tenant admins can run MS Graph queries to find all the users with a given certificateUserId value. More information can be found at [CertificateUserIds graph queries](concept-certificate-based-authentication-certificateuserids.md#update-certificateuserids-using-microsoft-graph-queries)
139
139
140
140
GET all user objects that have the value '[email protected]' value in certificateUserIds:
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-authentication-default-enablement.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ The following table lists each setting that can be set to Microsoft managed and
56
56
|[Registration campaign](how-to-mfa-registration-campaign.md)| Beginning in July, 2023, enabled for SMS and voice call users with free and trial subscriptions. |
57
57
|[Location in Microsoft Authenticator notifications](how-to-mfa-additional-context.md)| Disabled |
58
58
|[Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md)| Disabled |
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/). For example, see our blog post [It's Time to Hang Up on Phone Transports for Authentication](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752) for more information about the need to move away from using SMS and voice calls, which led to default enablement for the registration campaign to help users to set up Authenticator for modern authentication.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md
+98-40Lines changed: 98 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ ms.custom: has-adal-ref
19
19
20
20
# Certificate user IDs
21
21
22
-
Users in Azure AD can have a multivalued attribute named **certificateUserIds**. The attribute allows up to four values, and each value can be of 120-character length. It can store any value, and doesn't require email ID format. It can store non-routable User Principal Names (UPNs) like _bob@woodgrove_ or _bob@local_.
22
+
Users in Azure AD can have a multivalued attribute named **certificateUserIds**. The attribute allows up to four values, and each value can be of 120-character length. It can store any value and doesn't require email ID format. It can store non-routable User Principal Names (UPNs) like _bob@woodgrove_ or _bob@local_.
23
23
24
24
## Supported patterns for certificate user IDs
25
25
@@ -35,11 +35,11 @@ The values stored in **certificateUserIds** should be in the format described in
35
35
36
36
## Roles to update certificateUserIds
37
37
38
-
For cloudonly users, only users with roles **Global Administrators**, **Privileged Authentication Administrator** can write into certificateUserIds.
39
-
For sync'd users, AD users with role **Hybrid Identity Administrator** can write into the attribute.
38
+
For cloud-only users, only users with roles **Global Administrators**, **Privileged Authentication Administrator** can write into certificateUserIds.
39
+
For synched users, AD users with role **Hybrid Identity Administrator** can write into the attribute.
40
40
41
41
>[!NOTE]
42
-
>Active Directory Administrators (including accounts with delegated administrative privilege over sync'd user accounts as well as administrative rights over the Azure >AD Connect Servers) can make changes that impact the certificateUserIds value in Azure AD for any sync'd accounts.
42
+
>Active Directory Administrators (including accounts with delegated administrative privilege over synched user accounts as well as administrative rights over the Azure >AD Connect Servers) can make changes that impact the certificateUserIds value in Azure AD for any synched accounts.
43
43
44
44
## Update certificate user IDs in the Azure portal
45
45
@@ -66,7 +66,98 @@ Tenant admins can use the following steps Azure portal to update certificate use
66
66
1. Enter the value and click **Save**. You can add up to four values, each of 120 characters.
67
67
68
68
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/save.png" alt-text="Screenshot of a value to enter for CertificateUserId.":::
69
-
69
+
70
+
## Update certificateUserIds using Microsoft Graph queries
71
+
72
+
**Look up certificateUserIds**
73
+
74
+
Authorized callers can run Microsoft Graph queries to find all the users with a given certificateUserId value. On the Microsoft Graph [user](/graph/api/resources/user) object, the collection of certificateUserIds is stored in the **authorizationInfo** property.
75
+
76
+
To retrieve all user objects that have the value '[email protected]' in certificateUserIds:
77
+
78
+
```msgraph-interactive
79
+
GET https://graph.microsoft.com/v1.0/users?$filter=authorizationInfo/certificateUserIds/any(x:x eq '[email protected]')&$count=true
80
+
ConsistencyLevel: eventual
81
+
```
82
+
83
+
You can also use the `not` and `startsWith` operators to match the filter condition. To filter against the certificateUserIds object, the request must include the `$count=true` query string and the **ConsistencyLevel** header set to `eventual`.
84
+
85
+
**Update certificateUserIds**
86
+
87
+
Run a PATCH request to update the certificateUserIds for a given user.
88
+
89
+
#### Request body:
90
+
91
+
```http
92
+
PATCH https://graph.microsoft.com/v1.0/users/{id}
93
+
Content-Type: application/json
94
+
{
95
+
"authorizationInfo": {
96
+
"certificateUserIds": [
97
+
"X509:<PN>123456789098765@mil"
98
+
]
99
+
}
100
+
}
101
+
```
102
+
## Update certificateUserIds using PowerShell commands
103
+
104
+
For the configuration, you can use the [Azure Active Directory PowerShell Version 2](/powershell/microsoftgraph/installation):
105
+
106
+
1. Start Windows PowerShell with administrator privileges.
107
+
1. Install and Import the Microsoft Graph PowerShell SDK
1. Create a variable with CertificateUserIds values
127
+
128
+
```powershell
129
+
#Create a new variable to prepare the change. Ensure that you list any existing values you want to keep as this operation will overwrite the existing value
## Update certificate user IDs using Azure AD Connect
71
162
72
163
To update certificate user IDs for federated users, configure Azure AD Connect to sync userPrincipalName to certificateUserIds.
@@ -101,7 +192,7 @@ To synchronize X509:\<PN>PrincipalNameValue, create an outbound synchronization
101
192
102
193
### Synchronize X509:\<RFC822>RFC822Name
103
194
104
-
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule, choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
195
+
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule and choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
105
196
106
197
```
107
198
"X509:\<RFC822>"&[userPrincipalName]
@@ -150,7 +241,7 @@ alt-security-identity-add.
150
241
|Option | Value |
151
242
|-------|-------|
152
243
|Name | Descriptive name of the rule, such as: Out to AAD - certificateUserIds |
153
-
|Connected System | Your Azure AD doamin|
244
+
|Connected System | Your Azure AD domain|
154
245
|Connected System Object Type | user |
155
246
|Metaverse Object Type | person |
156
247
|Precedence | Choose a random high number not currently used |
## Look up certificateUserIds using Microsoft Graph queries
173
-
174
-
Authorized callers can run Microsoft Graph queries to find all the users with a given certificateUserId value. On the Microsoft Graph [user](/graph/api/resources/user) object, the collection of certificateUserIds are stored in the **authorizationInfo** property.
175
-
176
-
To retrieve all user objects that have the value '[email protected]' in certificateUserIds:
177
-
178
-
```msgraph-interactive
179
-
GET https://graph.microsoft.com/v1.0/users?$filter=authorizationInfo/certificateUserIds/any(x:x eq '[email protected]')&$count=true
180
-
ConsistencyLevel: eventual
181
-
```
182
-
183
-
You can also use the `not` and `startsWith` operators to match the filter condition. To filter against the certificateUserIds object, the request must include the `$count=true` query string and the **ConsistencyLevel** header set to `eventual`.
184
-
185
-
## Update certificateUserIds using Microsoft Graph queries
186
-
187
-
Run a PATCH request to update the certificateUserIds for a given user.
188
-
189
-
#### Request body:
190
-
191
-
```http
192
-
PATCH https://graph.microsoft.com/v1.0/users/{id}
193
-
Content-Type: application/json
194
-
195
-
{
196
-
"authorizationInfo": {
197
-
"certificateUserIds": [
198
-
"X509:<PN>123456789098765@mil"
199
-
]
200
-
}
201
-
}
202
-
```
203
-
204
-
205
263
## Next steps
206
264
207
265
-[Overview of Azure AD CBA](concept-certificate-based-authentication.md)
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-authenticator-lite.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ Users receive a notification in Outlook mobile to approve or deny sign-in, or th
29
29
30
30
## Prerequisites
31
31
32
-
- Your organization needs to enable Microsoft Authenticator (second factor) push notifications for some users or groups by using the modern Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
32
+
- Your organization needs to enable Microsoft Authenticator (second factor) push notifications for some users or groups by using the modern Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API. Organizations with an active MFA server or that have not started migration from per-user MFA are not eligible for this feature.
33
33
34
34
>[!TIP]
35
35
>We recommend that you also enable [system-preferred multifactor authentication (MFA)](concept-system-preferred-multifactor-authentication.md) when you enable Authenticator Lite. With system-preferred MFA enabled, users try to sign-in with Authenticator Lite before they try less secure telephony methods like SMS or voice call.
@@ -56,7 +56,7 @@ To disable Authenticator Lite in the Azure portal, complete the following steps:
56
56
57
57
2. On the Enable and Target tab, click Yes and All users to enable the Authenticator policy for everyone or add selected users and groups. Set the Authentication mode for these users/groups to Any or Push.
58
58
59
-
Only users who are enabled for Microsoft Authenticator here can be enabled to use Authenticator Lite for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature. Users who have Microsoft Authenticator downloaded on the same device Outlook is downloaded on will not be prompted to register for Authenticator Lite in Outlook.
59
+
Only users who are enabled for Microsoft Authenticator here can be enabled to use Authenticator Lite for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature. Users who have Microsoft Authenticator downloaded on the same device Outlook is downloaded on will not be prompted to register for Authenticator Lite in Outlook. Android users utilizing a personal and work profile on their device may be prompted to register if Authenticator is present on a different profile from the Outlook application.
@@ -306,6 +306,13 @@ Suppose you use tenant restrictions to block access by default, but you want to
306
306
307
307
:::image type="content" source="media/tenant-restrictions-v2/add-app-save.png" alt-text="Screenshot showing the selected application.":::
308
308
309
+
> [!NOTE]
310
+
>
311
+
> Blocking MSA tenant will not block
312
+
> - user-less traffic for devices. This includes traffic for Autopilot, Windows Update, and organizational telemetry.
313
+
> - B2B authentication of consumer accounts.
314
+
> - "Passthrough" authentication, used by many Azure apps and Office.com, where apps use Azure AD to sign in consumer users in a consumer context.
315
+
309
316
## Step 3: Enable tenant restrictions on Windows managed devices
310
317
311
318
After you create a tenant restrictions V2 policy, you can enforce the policy on each Windows 10, Windows 11, and Windows Server 2022 device by adding your tenant ID and the policy ID to the device's **Tenant Restrictions** configuration. When tenant restrictions are enabled on a Windows device, corporate proxies aren't required for policy enforcement. Devices don't need to be Azure AD managed to enforce tenant restrictions V2; domain-joined devices that are managed with Group Policy are also supported.
0 commit comments