Skip to content

Commit 7e44e09

Browse files
authored
Merge branch 'main' into fw-perf
2 parents 85857e5 + c9edc0e commit 7e44e09

File tree

737 files changed

+4913
-2729
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

737 files changed

+4913
-2729
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@
122122
},
123123
{
124124
"source_path_from_root": "/articles/active-directory/develop/active-directory-v2-limitations.md",
125-
"redirect_url": "/azure/active-directory/azuread-dev/azure-ad-endpoint-comparison",
125+
"redirect_url": "/azure/active-directory/develop/v2-overview",
126126
"redirect_document_id": false
127127
},
128128
{
@@ -1907,7 +1907,7 @@
19071907
},
19081908
{
19091909
"source_path_from_root": "/articles/active-directory/develop/azure-ad-endpoint-comparison.md",
1910-
"redirect_url": "/azure/active-directory/azuread-dev/azure-ad-endpoint-comparison",
1910+
"redirect_url": "/azure/active-directory/develop/v2-overview",
19111911
"redirect_document_id": false
19121912
},
19131913
{

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5536,6 +5536,11 @@
55365536
"source_path_from_root": "/articles/azure-monitor/app/custom-endpoints.md",
55375537
"redirect_url": "/azure/azure-monitor/app/create-new-resource",
55385538
"redirect_document_id": false
5539+
},
5540+
{
5541+
"source_path_from_root": "/articles/azure-monitor/logs/api/authentication-authorization.md",
5542+
"redirect_url": "/azure/azure-monitor/logs/api/access-api",
5543+
"redirect_document_id": false
55395544
}
55405545
]
55415546
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29518,6 +29518,11 @@
2951829518
"source_path_from_root": "/articles/aks/managed-cluster-snapshot.md",
2951929519
"redirect_url": "/azure/aks/intro-kubernetes",
2952029520
"redirect_document_id": "false"
29521+
},
29522+
{
29523+
"source_path": "articles/azure-cache-for-redis/redis-cache-insights-overview.md",
29524+
"redirect_url": "/azure/azure-cache-for-redis/cache-insights-overview",
29525+
"redirect_document_id": false
2952129526
}
2952229527
]
2952329528
}

articles/active-directory-b2c/active-directory-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/11/2020
12+
ms.date: 12/29/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -116,7 +116,7 @@ The name of the claim is the name of the Azure AD attribute unless the **Partner
116116
- The value of the **userPrincipalName** claim must be in the format of `[email protected]`.
117117
- The **displayName** claim is required and cannot be an empty string.
118118

119-
## Azure AD technical provider operations
119+
## Azure AD technical profile operations
120120

121121
### Read
122122

articles/active-directory-b2c/roles-resource-access-control.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 10/08/2021
12+
ms.date: 11/25/2021
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -20,7 +20,7 @@ When planning your access control strategy, it's best to assign users the least
2020
|Resource |Description |Role |
2121
|---------|---------|---------|
2222
|[Application registrations](tutorial-register-applications.md) | Create and manage all aspects of your web, mobile, and native application registrations within Azure AD B2C.|[Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator)|
23-
|Tenant Creator| Create new Azure AD or Azure AD B2C tenants.||
23+
|Tenant Creator| Create new Azure AD or Azure AD B2C tenants.| [Tenant Creator](../active-directory/roles/permissions-reference.md#tenant-creator)|
2424
|[Identity providers](add-identity-provider.md)| Configure the [local identity provider](identity-provider-local.md) and external social or enterprise identity providers. | [External Identity Provider Administrator](../active-directory/roles/permissions-reference.md#external-identity-provider-administrator)|
2525
|[API connectors](add-api-connector.md)| Integrate your user flows with web APIs to customize the user experience and integrate with external systems.|[External ID User Flow Administrator](../active-directory/roles/permissions-reference.md#external-id-user-flow-administrator)|
2626
|[Company branding](customize-ui.md#configure-company-branding)| Customize your user flow pages.| [Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator)|

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,19 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
## November 2022
19+
20+
### New articles
21+
22+
- [Configure Azure Active Directory B2C with Akamai Enterprise Application Access for SSO and secure hybrid access](partner-akamai-secure-hybrid-access.md)
23+
24+
### Updated articles
25+
26+
- [Manage your Azure Active Directory B2C tenant](tenant-management.md)
27+
- [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-operations.md)
28+
- [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
29+
- [Roles and resource access control](roles-resource-access-control.md)
30+
- [Define an Azure Active Directory technical profile in an Azure Active Directory B2C custom policy](active-directory-technical-profile.md)
1831

1932
## October 2022
2033

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 11/04/2022
4+
ms.date: 11/28/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 28 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 11/11/2022
7+
ms.date: 11/23/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -23,9 +23,6 @@ This topic covers how to enable number matching in Microsoft Authenticator push
2323

2424
- Your organization needs to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
2525

26-
>[!NOTE]
27-
>The policy schema for Microsoft Graph APIs has been improved. The older policy schema is now deprecated. Make sure you use the new schema to help prevent errors.
28-
2926
- If your organization is using AD FS adapter or NPS extensions, upgrade to the latest versions for a consistent experience.
3027

3128
## Number matching
@@ -40,9 +37,6 @@ Number matching is available for the following scenarios. When enabled, all scen
4037
- [AD FS adapter](howto-mfaserver-adfs-windows-server.md)
4138
- [NPS extension](howto-mfa-nps-extension.md)
4239

43-
>[!NOTE]
44-
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
45-
4640
Number matching is available for sign-in for Azure Government. However, it's currently not available for Authenticator setup in combined registration. Number matching will be available for Authenticator setup in [combined registration](howto-registration-mfa-sspr-combined.md) by November 30, 2022 for Azure Government.
4741

4842
Number matching isn't supported for Apple Watch notifications. Apple Watch users need to use their phone to approve notifications when number matching is enabled.
@@ -67,9 +61,8 @@ The AD FS adapter supports number matching after installing an update. Unpatched
6761

6862
| Version | Update |
6963
|---------|--------|
70-
| Windows Server 2022 | [October 26, 2021—KB5006745 (OS Build 20348.320) Preview](https://support.microsoft.com/topic/october-26-2021-kb5006745-os-build-20348-320-preview-8ff9319a-19e7-40c7-bbd1-cd70fcca066c) |
71-
| Windows Server 2019 | [October 19, 2021—KB5006744 (OS Build 17763.2268) Preview](https://support.microsoft.com/topic/october-19-2021-kb5006744-os-build-17763-2268-preview-e043a8a3-901b-4190-bb6b-f5a4137411c0) |
72-
| Windows Server 2016 | [October 12, 2021—KB5006669 (OS Build 14393.4704)](https://support.microsoft.com/topic/october-12-2021-kb5006669-os-build-14393-4704-bcc95546-0768-49ae-bec9-240cc59df384) |
64+
| Windows Server 2022 | [November 9, 2021—KB5007205 (OS Build 20348.350)](https://support.microsoft.com/topic/november-9-2021-kb5007205-os-build-20348-350-af102e6f-cc7c-4cd4-8dc2-8b08d73d2b31) |
65+
| Windows Server 2019 | [November 9, 2021—KB5007206 (OS Build 17763.2300)](https://support.microsoft.com/topic/november-9-2021-kb5007206-os-build-17763-2300-c63b76fa-a9b4-4685-b17c-7d866bb50e48) |
7366

7467

7568
### NPS extension
@@ -89,7 +82,22 @@ To create the registry key that overrides push notifications:
8982
Value = TRUE
9083
1. Restart the NPS Service.
9184

92-
### Policy schema changes
85+
## Enable number matching in the portal
86+
87+
To enable number matching in the Azure AD portal, complete the following steps:
88+
89+
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
90+
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone or add selected users and groups. Set the **Authentication mode** for these users/groups to **Any**/**Push**.
91+
92+
Only users who are enabled for Microsoft Authenticator here can be included in the policy to require number matching for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature.
93+
94+
:::image type="content" border="true" source="./media/how-to-mfa-number-match/enable-settings-number-match.png" alt-text="Screenshot of how to enable Microsoft Authenticator settings for Push authentication mode.":::
95+
96+
1. On the **Configure** tab, for **Require number matching for push notifications**, change **Status** to **Enabled**, choose who to include or exclude from number matching, and click **Save**.
97+
98+
:::image type="content" border="true" source="./media/how-to-mfa-number-match/number-match.png" alt-text="Screenshot of how to enable number matching.":::
99+
100+
## Enable number matching using Graph APIs
93101

94102
Identify your single target group for the schema configuration. Then use the following API endpoint to change the numberMatchingRequiredState property under featureSettings to **enabled**, and include or exclude groups:
95103

@@ -98,10 +106,10 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
98106
```
99107

100108
>[!NOTE]
101-
>Make sure you use the new policy schema for Microsoft Graph APIs. In Graph Explorer, you'll need to consent to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
109+
>In Graph Explorer, you'll need to consent to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
102110
103111

104-
#### MicrosoftAuthenticatorAuthenticationMethodConfiguration properties
112+
### MicrosoftAuthenticatorAuthenticationMethodConfiguration properties
105113

106114
**PROPERTIES**
107115

@@ -117,7 +125,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
117125
| includeTargets | [microsoftAuthenticatorAuthenticationMethodTarget](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) collection | A collection of users or groups who are enabled to use the authentication method |
118126
| featureSettings | [microsoftAuthenticatorFeatureSettings](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) collection | A collection of Microsoft Authenticator features. |
119127

120-
#### MicrosoftAuthenticator includeTarget properties
128+
### MicrosoftAuthenticator includeTarget properties
121129

122130
**PROPERTIES**
123131

@@ -129,7 +137,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
129137

130138

131139

132-
#### MicrosoftAuthenticator featureSettings properties
140+
### MicrosoftAuthenticator featureSettings properties
133141

134142
**PROPERTIES**
135143

@@ -139,7 +147,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
139147
| displayAppInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown application name in Microsoft Authenticator notification. |
140148
| displayLocationInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown geographic location context in Microsoft Authenticator notification. |
141149

142-
#### Authentication method feature configuration properties
150+
### Authentication method feature configuration properties
143151

144152
**PROPERTIES**
145153

@@ -149,7 +157,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
149157
| includeTarget | featureTarget | A single entity that is included in this feature. <br>You can only include one group for number matching.|
150158
| State | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
151159

152-
#### Feature target properties
160+
### Feature target properties
153161

154162
**PROPERTIES**
155163

@@ -161,7 +169,7 @@ https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMetho
161169
>[!NOTE]
162170
>Number matching can be enabled only for a single group.
163171
164-
#### Example of how to enable number matching for all users
172+
### Example of how to enable number matching for all users
165173

166174
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** from **default** to **enabled**.
167175

@@ -216,7 +224,7 @@ To confirm the change is applied, run the GET request by using the following end
216224
GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
217225
```
218226

219-
#### Example of how to enable number matching for a single group
227+
### Example of how to enable number matching for a single group
220228

221229
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
222230
Inside the **includeTarget**, you'll need to change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
@@ -262,7 +270,7 @@ To verify, run GET again and verify the ObjectID:
262270
GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
263271
```
264272

265-
#### Example of removing the excluded group from number matching
273+
### Example of removing the excluded group from number matching
266274

267275
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
268276
You need to change the **id** of the **excludeTarget** to `00000000-0000-0000-0000-000000000000`.
@@ -302,58 +310,6 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
302310
}
303311
```
304312

305-
### Turn off number matching
306-
307-
To turn number matching off, you'll need to PATCH remove **numberMatchingRequiredState** from **enabled** to **disabled**/**default**.
308-
309-
```json
310-
{
311-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
312-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
313-
"id": "MicrosoftAuthenticator",
314-
"state": "enabled",
315-
"featureSettings": {
316-
"numberMatchingRequiredState": {
317-
"state": "default",
318-
"includeTarget": {
319-
"targetType": "group",
320-
"id": "1ca44590-e896-4dbe-98ed-b140b1e7a53a"
321-
},
322-
"excludeTarget": {
323-
"targetType": "group",
324-
"id": " 00000000-0000-0000-0000-000000000000"
325-
}
326-
}
327-
},
328-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
329-
"includeTargets": [
330-
{
331-
"targetType": "group",
332-
"id": "all_users",
333-
"isRegistrationRequired": false,
334-
"authenticationMode": "any"
335-
}
336-
]
337-
}
338-
```
339-
340-
## Enable number matching in the portal
341-
342-
To enable number matching in the Azure AD portal, complete the following steps:
343-
344-
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
345-
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone or add selected users and groups. Set the **Authentication mode** for these users/groups to **Any**/**Push**.
346-
347-
Only users who are enabled for Microsoft Authenticator here can be included in the policy to require number matching for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature.
348-
349-
:::image type="content" border="true" source="./media/how-to-mfa-number-match/enable-settings-number-match.png" alt-text="Screenshot of how to enable Microsoft Authenticator settings for Push authentication mode.":::
350-
351-
1. On the **Configure** tab, for **Require number matching for push notifications**, change **Status** to **Enabled**, choose who to include or exclude from number matching, and click **Save**.
352-
353-
:::image type="content" border="true" source="./media/how-to-mfa-number-match/number-match.png" alt-text="Screenshot of how to enable number matching.":::
354-
355-
356-
357313
## FAQs
358314

359315
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?

0 commit comments

Comments
 (0)