Skip to content

Commit 7b03752

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 36f288f + 6f0e6e5 commit 7b03752

File tree

116 files changed

+846
-510
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

116 files changed

+846
-510
lines changed

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ sections:
135135
- question: |
136136
CertificateUserIds update fails with value already there. How can an admin query all the user objects with the same value?
137137
answer: |
138-
Tenant admins can run MS Graph queries to find all the users with a given certificateUserId value. More information can be found at [CertificateUserIds graph queries](concept-certificate-based-authentication-certificateuserids.md#look-up-certificateuserids-using-microsoft-graph-queries)
138+
Tenant admins can run MS Graph queries to find all the users with a given certificateUserId value. More information can be found at [CertificateUserIds graph queries](concept-certificate-based-authentication-certificateuserids.md#update-certificateuserids-using-microsoft-graph-queries)
139139
140140
GET all user objects that have the value '[email protected]' value in certificateUserIds:
141141

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ The following table lists each setting that can be set to Microsoft managed and
5656
| [Registration campaign](how-to-mfa-registration-campaign.md) | Beginning in July, 2023, enabled for SMS and voice call users with free and trial subscriptions. |
5757
| [Location in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
5858
| [Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
59-
| [System-preferred MFA](concept-system-preferred-multifactor-authentication.md) | Disabled |
59+
| [System-preferred MFA](concept-system-preferred-multifactor-authentication.md) | Enabled |
6060
| [Authenticator Lite](how-to-mfa-authenticator-lite.md) | Enabled |
6161

6262
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/). For example, see our blog post [It's Time to Hang Up on Phone Transports for Authentication](https://techcommunity.microsoft.com/t5/microsoft-entra-azure-ad-blog/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752) for more information about the need to move away from using SMS and voice calls, which led to default enablement for the registration campaign to help users to set up Authenticator for modern authentication.

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 98 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom: has-adal-ref
1919

2020
# Certificate user IDs
2121

22-
Users in Azure AD can have a multivalued attribute named **certificateUserIds**. The attribute allows up to four values, and each value can be of 120-character length. It can store any value, and doesn't require email ID format. It can store non-routable User Principal Names (UPNs) like _bob@woodgrove_ or _bob@local_.
22+
Users in Azure AD can have a multivalued attribute named **certificateUserIds**. The attribute allows up to four values, and each value can be of 120-character length. It can store any value and doesn't require email ID format. It can store non-routable User Principal Names (UPNs) like _bob@woodgrove_ or _bob@local_.
2323

2424
## Supported patterns for certificate user IDs
2525

@@ -35,11 +35,11 @@ The values stored in **certificateUserIds** should be in the format described in
3535

3636
## Roles to update certificateUserIds
3737

38-
For cloud only users, only users with roles **Global Administrators**, **Privileged Authentication Administrator** can write into certificateUserIds.
39-
For sync'd users, AD users with role **Hybrid Identity Administrator** can write into the attribute.
38+
For cloud-only users, only users with roles **Global Administrators**, **Privileged Authentication Administrator** can write into certificateUserIds.
39+
For synched users, AD users with role **Hybrid Identity Administrator** can write into the attribute.
4040

4141
>[!NOTE]
42-
>Active Directory Administrators (including accounts with delegated administrative privilege over sync'd user accounts as well as administrative rights over the Azure >AD Connect Servers) can make changes that impact the certificateUserIds value in Azure AD for any sync'd accounts.
42+
>Active Directory Administrators (including accounts with delegated administrative privilege over synched user accounts as well as administrative rights over the Azure >AD Connect Servers) can make changes that impact the certificateUserIds value in Azure AD for any synched accounts.
4343
4444
## Update certificate user IDs in the Azure portal
4545

@@ -66,7 +66,98 @@ Tenant admins can use the following steps Azure portal to update certificate use
6666
1. Enter the value and click **Save**. You can add up to four values, each of 120 characters.
6767

6868
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-certificateuserids/save.png" alt-text="Screenshot of a value to enter for CertificateUserId.":::
69-
69+
70+
## Update certificateUserIds using Microsoft Graph queries
71+
72+
**Look up certificateUserIds**
73+
74+
Authorized callers can run Microsoft Graph queries to find all the users with a given certificateUserId value. On the Microsoft Graph [user](/graph/api/resources/user) object, the collection of certificateUserIds is stored in the **authorizationInfo** property.
75+
76+
To retrieve all user objects that have the value '[email protected]' in certificateUserIds:
77+
78+
```msgraph-interactive
79+
GET https://graph.microsoft.com/v1.0/users?$filter=authorizationInfo/certificateUserIds/any(x:x eq '[email protected]')&$count=true
80+
ConsistencyLevel: eventual
81+
```
82+
83+
You can also use the `not` and `startsWith` operators to match the filter condition. To filter against the certificateUserIds object, the request must include the `$count=true` query string and the **ConsistencyLevel** header set to `eventual`.
84+
85+
**Update certificateUserIds**
86+
87+
Run a PATCH request to update the certificateUserIds for a given user.
88+
89+
#### Request body:
90+
91+
```http
92+
PATCH https://graph.microsoft.com/v1.0/users/{id}
93+
Content-Type: application/json
94+
{
95+
"authorizationInfo": {
96+
"certificateUserIds": [
97+
"X509:<PN>123456789098765@mil"
98+
]
99+
}
100+
}
101+
```
102+
## Update certificateUserIds using PowerShell commands
103+
104+
For the configuration, you can use the [Azure Active Directory PowerShell Version 2](/powershell/microsoftgraph/installation):
105+
106+
1. Start Windows PowerShell with administrator privileges.
107+
1. Install and Import the Microsoft Graph PowerShell SDK
108+
109+
```powershell
110+
Install-Module Microsoft.Graph -Scope AllUsers
111+
Import-Module Microsoft.Graph.Authentication
112+
Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
113+
```
114+
1. Connect to the tenant and accept all
115+
116+
```powershell
117+
Connect-MGGraph -Scopes "Directory.ReadWrite.All", "User.ReadWrite.All" -TenantId <tenantId>
118+
```
119+
1. List CertificateUserIds attribute of a given user
120+
121+
```powershell
122+
$results = Invoke-MGGraphRequest -Method get -Uri 'https://graph.microsoft.com/v1.0/users/<userId>?$select=authorizationinfo' -OutputType PSObject -Headers @{'ConsistencyLevel' = 'eventual' }
123+
#list certificateUserIds
124+
$results.authorizationInfo
125+
```
126+
1. Create a variable with CertificateUserIds values
127+
128+
```powershell
129+
#Create a new variable to prepare the change. Ensure that you list any existing values you want to keep as this operation will overwrite the existing value
130+
$params = @{
131+
      authorizationInfo = @{
132+
            certificateUserIds = @(
133+
            "X509:<SKI>eec6b88788d2770a01e01775ce71f1125cd6ad0f",
134+
            "X509:<PN>[email protected]"
135+
            )
136+
      }
137+
}
138+
```
139+
1. Update CertificateUserIds attribute
140+
141+
```powershell
142+
$results = Invoke-MGGraphRequest -Method patch -Uri 'https://graph.microsoft.com/v1.0/users/<UserId>/?$select=authorizationinfo' -OutputType PSObject -Headers @{'ConsistencyLevel' = 'eventual' } -Body $params
143+
```
144+
145+
**Update CertificateUserIds using user object**
146+
147+
1. Get the user object
148+
149+
```powershell
150+
$userObjectId = "6b2d3bd3-b078-4f46-ac53-f862f35e10b6"
151+
$user = get-mguser -UserId $userObjectId -Property AuthorizationInfo
152+
```
153+
154+
1. Update the CertificateUserIds attribute of the user object
155+
156+
```powershell
157+
$user.AuthorizationInfo.certificateUserIds = @("X509:<SKI>eec6b88788d2770a01e01775ce71f1125cd6ad0f", "X509:<PN>[email protected]")
158+
Update-MgUser -UserId $userObjectId -AuthorizationInfo $user.AuthorizationInfo
159+
```
160+
70161
## Update certificate user IDs using Azure AD Connect
71162

72163
To update certificate user IDs for federated users, configure Azure AD Connect to sync userPrincipalName to certificateUserIds.
@@ -101,7 +192,7 @@ To synchronize X509:\<PN>PrincipalNameValue, create an outbound synchronization
101192

102193
### Synchronize X509:\<RFC822>RFC822Name
103194

104-
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule, choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
195+
To synchronize X509:\<RFC822>RFC822Name, create an outbound synchronization rule and choose **Expression** in the flow type. Choose the target attribute as **certificateUserIds**, and in the source field, add the following expression. If your source attribute isn't userPrincipalName, you can change the expression accordingly.
105196

106197
```
107198
"X509:\<RFC822>"&[userPrincipalName]
@@ -150,7 +241,7 @@ alt-security-identity-add.
150241
|Option | Value |
151242
|-------|-------|
152243
|Name | Descriptive name of the rule, such as: Out to AAD - certificateUserIds |
153-
|Connected System | Your Azure AD doamin |
244+
|Connected System | Your Azure AD domain |
154245
|Connected System Object Type | user |
155246
|Metaverse Object Type | person |
156247
|Precedence | Choose a random high number not currently used |
@@ -169,39 +260,6 @@ IIF(IsPresent([alternativeSecurityId]),
169260
)
170261
```
171262

172-
## Look up certificateUserIds using Microsoft Graph queries
173-
174-
Authorized callers can run Microsoft Graph queries to find all the users with a given certificateUserId value. On the Microsoft Graph [user](/graph/api/resources/user) object, the collection of certificateUserIds are stored in the **authorizationInfo** property.
175-
176-
To retrieve all user objects that have the value '[email protected]' in certificateUserIds:
177-
178-
```msgraph-interactive
179-
GET https://graph.microsoft.com/v1.0/users?$filter=authorizationInfo/certificateUserIds/any(x:x eq '[email protected]')&$count=true
180-
ConsistencyLevel: eventual
181-
```
182-
183-
You can also use the `not` and `startsWith` operators to match the filter condition. To filter against the certificateUserIds object, the request must include the `$count=true` query string and the **ConsistencyLevel** header set to `eventual`.
184-
185-
## Update certificateUserIds using Microsoft Graph queries
186-
187-
Run a PATCH request to update the certificateUserIds for a given user.
188-
189-
#### Request body:
190-
191-
```http
192-
PATCH https://graph.microsoft.com/v1.0/users/{id}
193-
Content-Type: application/json
194-
195-
{
196-
"authorizationInfo": {
197-
"certificateUserIds": [
198-
"X509:<PN>123456789098765@mil"
199-
]
200-
}
201-
}
202-
```
203-
204-
205263
## Next steps
206264

207265
- [Overview of Azure AD CBA](concept-certificate-based-authentication.md)

articles/active-directory/authentication/how-to-mfa-authenticator-lite.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Users receive a notification in Outlook mobile to approve or deny sign-in, or th
2929
3030
## Prerequisites
3131

32-
- Your organization needs to enable Microsoft Authenticator (second factor) push notifications for some users or groups by using the modern Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
32+
- Your organization needs to enable Microsoft Authenticator (second factor) push notifications for some users or groups by using the modern Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API. Organizations with an active MFA server or that have not started migration from per-user MFA are not eligible for this feature.
3333

3434
>[!TIP]
3535
>We recommend that you also enable [system-preferred multifactor authentication (MFA)](concept-system-preferred-multifactor-authentication.md) when you enable Authenticator Lite. With system-preferred MFA enabled, users try to sign-in with Authenticator Lite before they try less secure telephony methods like SMS or voice call.
@@ -56,7 +56,7 @@ To disable Authenticator Lite in the Azure portal, complete the following steps:
5656

5757
2. On the Enable and Target tab, click Yes and All users to enable the Authenticator policy for everyone or add selected users and groups. Set the Authentication mode for these users/groups to Any or Push.
5858

59-
Only users who are enabled for Microsoft Authenticator here can be enabled to use Authenticator Lite for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature. Users who have Microsoft Authenticator downloaded on the same device Outlook is downloaded on will not be prompted to register for Authenticator Lite in Outlook.
59+
Only users who are enabled for Microsoft Authenticator here can be enabled to use Authenticator Lite for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature. Users who have Microsoft Authenticator downloaded on the same device Outlook is downloaded on will not be prompted to register for Authenticator Lite in Outlook. Android users utilizing a personal and work profile on their device may be prompted to register if Authenticator is present on a different profile from the Outlook application.
6060

6161
<img width="1112" alt="Entra portal Authenticator settings" src="https://user-images.githubusercontent.com/108090297/228603771-52c5933c-f95e-4f19-82db-eda2ba640b94.png">
6262

articles/active-directory/external-identities/tenant-restrictions-v2.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ To configure tenant restrictions, you'll need the following:
162162

163163
- Azure AD Premium P1 or P2
164164
- Account with a role of Global administrator or Security administrator
165-
- Windows devices running Windows 10, Windows 11, or Windows Server 2022 with the latest updates
165+
- Windows devices running Windows 10, Windows 11 with the latest updates
166166

167167
## Step 1: Configure default tenant restrictions V2
168168

@@ -306,6 +306,13 @@ Suppose you use tenant restrictions to block access by default, but you want to
306306

307307
:::image type="content" source="media/tenant-restrictions-v2/add-app-save.png" alt-text="Screenshot showing the selected application.":::
308308

309+
> [!NOTE]
310+
>
311+
> Blocking MSA tenant will not block
312+
> - user-less traffic for devices. This includes traffic for Autopilot, Windows Update, and organizational telemetry.
313+
> - B2B authentication of consumer accounts.
314+
> - "Passthrough" authentication, used by many Azure apps and Office.com, where apps use Azure AD to sign in consumer users in a consumer context.
315+
309316
## Step 3: Enable tenant restrictions on Windows managed devices
310317

311318
After you create a tenant restrictions V2 policy, you can enforce the policy on each Windows 10, Windows 11, and Windows Server 2022 device by adding your tenant ID and the policy ID to the device's **Tenant Restrictions** configuration. When tenant restrictions are enabled on a Windows device, corporate proxies aren't required for policy enforcement. Devices don't need to be Azure AD managed to enforce tenant restrictions V2; domain-joined devices that are managed with Group Policy are also supported.

0 commit comments

Comments
 (0)