Skip to content

Commit 7fb9a49

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into more-concept-articles
2 parents a4eaf43 + 36504a7 commit 7fb9a49

File tree

191 files changed

+1972
-1388
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

191 files changed

+1972
-1388
lines changed

articles/active-directory-b2c/partner-dynamics-365-fraud-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,14 +10,14 @@ ms.reviewer: kengaderdus
1010
ms.service: active-directory
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 5/12/2021
13+
ms.date: 08/28/2022
1414
ms.author: gasinh
1515
ms.subservice: B2C
1616
---
1717

1818
# Tutorial: Configure Microsoft Dynamics 365 Fraud Protection with Azure Active Directory B2C
1919

20-
In this sample tutorial, learn how to integrate [Microsoft Dynamics 365 Fraud Protection](/dynamics365/fraud-protection/overview) (DFP) with Azure Active Directory (AD) B2C.
20+
In this sample tutorial, learn how to integrate [Microsoft Dynamics 365 Fraud Protection](/dynamics365/fraud-protection/ap-overview) (DFP) with Azure Active Directory (AD) B2C.
2121

2222
Microsoft DFP provides organizations with the capability to assess the risk of attempts to create fraudulent accounts and log-ins. Microsoft DFP assessment can be used by the customer to block or challenge suspicious attempts to create new fake accounts or to compromise existing accounts.
2323

articles/active-directory/app-provisioning/on-premises-application-provisioning-architecture.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: overview
10-
ms.date: 04/11/2022
10+
ms.date: 08/26/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -31,6 +31,8 @@ There are three primary components to provisioning users into an on-premises app
3131
> Microsoft Identity Manager Synchronization isn't required. But you can use it to build and test your ECMA connector before you import it into the ECMA host.
3232
3333

34+
> [!VIDEO https://www.youtube.com/embed/QdfdpaFolys]
35+
3436
### Firewall requirements
3537

3638
You don't need to open inbound connections to the corporate network. The provisioning agents only use outbound connections to the provisioning service, which means there's no need to open firewall ports for incoming connections. You also don't need a perimeter (DMZ) network because all connections are outbound and take place over a secure channel.
@@ -60,9 +62,9 @@ When we think of traditional DNs in a traditional format, for say, Active Direct
6062

6163
`CN=Lola Jacobson,CN=Users,DC=contoso,DC=com`
6264

63-
However, for a data source such as SQL, which is flat, not hierarchical, the DN needs to be either already present in one of the table or created from the information we provide to the ECMA Connector Host.
65+
However, for a data source such as SQL, which is flat, not hierarchical, the DN needs to be either already present in one of the tables or created from the information we provide to the ECMA Connector Host.
6466

65-
This can be achieved by checking **Autogenerated** in the checkbox when configuring the genericSQL connector. When you choose DN to be autogenerated, the ECMA host will generate a DN in an LDAP format: CN=<anchorvalue>,OBJECT=<type>. This also assumes that DN is Anchor is **unchecked** in the Connectivity page.
67+
This can be achieved by checking **Autogenerated** in the checkbox when configuring the genericSQL connector. When you choose DN to be autogenerated, the ECMA host will generate a DN in an LDAP format: CN=<anchorvalue>,OBJECT=<type>. This also assumes that the DN is Anchor **unchecked** in the Connectivity page.
6668

6769
[![DN is Anchor unchecked](.\media\on-premises-application-provisioning-architecture\user-2.png)](.\media\on-premises-application-provisioning-architecture\user-2.png#lightbox)
6870

@@ -79,14 +81,14 @@ Since ECMA Connector Host currently only supports the USER object type, the OBJE
7981
You can define one or more matching attribute(s) and prioritize them based on the precedence. Should you want to change the matching attribute you can also do so.
8082
[![Matching attribute](.\media\on-premises-application-provisioning-architecture\match-1.png)](.\media\on-premises-application-provisioning-architecture\match-1.png#lightbox)
8183

82-
2. ECMA Connector Host receives the GET request and queries its internal cache to see if the user exists and has based imported. This is done using the matching attribute(s) above. If you define multiple matching attributes, the Azure AD provisioning service will send a GET request for each attribute and the ECMA host will check it's cache for a match until it finds one.
84+
2. ECMA Connector Host receives the GET request and queries its internal cache to see if the user exists and has based imported. This is done using the matching attribute(s) above. If you define multiple matching attributes, the Azure AD provisioning service will send a GET request for each attribute and the ECMA host will check its cache for a match until it finds one.
8385

8486
3. If the user does not exist, Azure AD will make a POST request to create the user. The ECMA Connector Host will respond back to Azure AD with the HTTP 201 and provide an ID for the user. This ID is derived from the anchor value defined in the object types page. This anchor will be used by Azure AD to query the ECMA Connector Host for future and subsequent requests.
8587
4. If a change happens to the user in Azure AD, then Azure AD will make a GET request to retrieve the user using the anchor from the previous step, rather than the matching attribute in step 1. This allows, for example, the UPN to change without breaking the link between the user in Azure AD and in the app.
8688

8789

8890
## Agent best practices
89-
- Using the same agent for the on-prem provisioning feature along with Workday / SuccessFactors / Azure AD Connect Cloud Sync is currently unsupported. We are actively working to support on-prem provisioning on the same agent as the other provisioning scenarios.
91+
- Using the same agent for the on-premises provisioning feature along with Workday / SuccessFactors / Azure AD Connect Cloud Sync is currently unsupported. We are actively working to support on-premises provisioning on the same agent as the other provisioning scenarios.
9092
- - Avoid all forms of inline inspection on outbound TLS communications between agents and Azure. This type of inline inspection causes degradation to the communication flow.
9193
- The agent must communicate with both Azure and your application, so the placement of the agent affects the latency of those two connections. You can minimize the latency of the end-to-end traffic by optimizing each network connection. Each connection can be optimized by:
9294
- Reducing the distance between the two ends of the hop.
@@ -135,7 +137,7 @@ You can also check whether all the required ports are open.
135137
- Microsoft Azure AD Connect Provisioning Agent Package
136138

137139
## Provisioning agent history
138-
This article lists the versions and features of Azure Active Directory Connect Provisioning Agent that have been released. The Azure AD team regularly updates the Provisioning Agent with new features and functionality. Please ensure that you do not use the same agent for on-prem provisioning and Cloud Sync / HR-driven provisioning.
140+
This article lists the versions and features of Azure Active Directory Connect Provisioning Agent that have been released. The Azure AD team regularly updates the Provisioning Agent with new features and functionality. Please ensure that you do not use the same agent for on-premises provisioning and Cloud Sync / HR-driven provisioning.
139141

140142
Microsoft provides direct support for the latest agent version and one version before.
141143

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ c5dbd20a-8b8f-4791-a23f-488fcbde3b38 5/22/2022 11:19:17 PM False True
113113
114114
```
115115

116-
For more information, see [New-MgUserAuthenticationTemporaryAccessPassMethod](/powershell/module/microsoft.graph.identity.signins/new-mguserauthenticationtemporaryaccesspassmethod&preserve-view=true) and [Get-MgUserAuthenticationTemporaryAccessPassMethod](/powershell/module/microsoft.graph.identity.signins/get-mguserauthenticationtemporaryaccesspassmethod?view=graph-powershell-beta&preserve-view=true).
116+
For more information, see [New-MgUserAuthenticationTemporaryAccessPassMethod](/powershell/module/microsoft.graph.identity.signins/new-mguserauthenticationtemporaryaccesspassmethod) and [Get-MgUserAuthenticationTemporaryAccessPassMethod](/powershell/module/microsoft.graph.identity.signins/get-mguserauthenticationtemporaryaccesspassmethod?view=graph-powershell-beta&preserve-view=true).
117117

118118
## Use a Temporary Access Pass
119119

articles/active-directory/cloud-sync/reference-cloud-sync-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ metadata:
44
description: This document describes frequently asked questions for cloud sync.
55
services: active-directory
66
author: billmath
7-
manager: karenhoran
7+
manager: amycolannino
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: faq

articles/active-directory/conditional-access/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,8 @@
8282
href: howto-conditional-access-policy-location.md
8383
- name: Block access
8484
href: howto-conditional-access-policy-block-access.md
85+
- name: Require MFA for Intune enrollment
86+
href: /mem/intune/enrollment/multi-factor-authentication?toc=/azure/active-directory/conditional-access/TOC.json
8587
- name: Configure resilience defaults
8688
href: resilience-defaults.md
8789
- name: Configure report only mode

articles/active-directory/conditional-access/howto-conditional-access-policy-risk-user.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find leaked username and password pairs. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating [Azure AD Identity Protection user risk detections](../identity-protection/concept-identity-protection-risks.md).
2121

22-
There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes in the policy.
22+
There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes like sign-in frequency in the policy.
2323

2424
## Template deployment
2525

@@ -41,21 +41,21 @@ Organizations can choose to deploy this policy using the steps outlined below or
4141
1. Under **Access controls** > **Grant**.
4242
1. Select **Grant access**, **Require password change**.
4343
1. Select **Select**.
44+
1. Under **Session**.
45+
1. Select **Sign-in frequency**.
46+
1. Ensure **Every time** is selected.
47+
1. Select **Select**.
4448
1. Confirm your settings, and set **Enable policy** to **Report-only**.
4549
1. Select **Create** to create to enable your policy.
4650

47-
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
51+
After administrators confirm the settings using [report-only mode](howto-conditional-access-insights-reporting.md), they can move the **Enable policy** toggle from **Report-only** to **On**.
4852

4953
## Next steps
5054

51-
[Remediate risks and unblock users](../identity-protection/howto-identity-protection-remediate-unblock.md)
52-
53-
[Conditional Access common policies](concept-conditional-access-policy-common.md)
54-
55-
[Sign-in risk-based Conditional Access](howto-conditional-access-policy-risk.md)
56-
57-
[Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
58-
59-
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
60-
61-
[What is Azure Active Directory Identity Protection?](../identity-protection/overview-identity-protection.md)
55+
- [Require reauthentication every time](../conditional-access/howto-conditional-access-session-lifetime.md#require-reauthentication-every-time)
56+
- [Remediate risks and unblock users](../identity-protection/howto-identity-protection-remediate-unblock.md)
57+
- [Conditional Access common policies](concept-conditional-access-policy-common.md)
58+
- [Sign-in risk-based Conditional Access](howto-conditional-access-policy-risk.md)
59+
- [Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
60+
- [Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
61+
- [What is Azure Active Directory Identity Protection?](../identity-protection/overview-identity-protection.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-risk.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ Most users have a normal behavior that can be tracked, when they fall outside of
2121

2222
A sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating [Azure AD Identity Protection sign-in risk detections](../identity-protection/concept-identity-protection-risks.md#sign-in-risk).
2323

24-
There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes in the policy.
24+
There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes like sign-in frequency in the policy.
2525

26-
The Sign-in risk-based policy protects users from registering MFA in risky sessions. If users aren't registered for MFA, their risky sign-ins will get blocked, and they see an AADSTS53004 error.
26+
The Sign-in risk-based policy protects users from registering MFA in risky sessions. If users aren't registered for MFA, their risky sign-ins are blocked, and they see an AADSTS53004 error.
2727

2828
## Template deployment
2929

@@ -45,21 +45,21 @@ Organizations can choose to deploy this policy using the steps outlined below or
4545
1. Under **Access controls** > **Grant**.
4646
1. Select **Grant access**, **Require multifactor authentication**.
4747
1. Select **Select**.
48+
1. Under **Session**.
49+
1. Select **Sign-in frequency**.
50+
1. Ensure **Every time** is selected.
51+
1. Select **Select**.
4852
1. Confirm your settings and set **Enable policy** to **Report-only**.
4953
1. Select **Create** to create to enable your policy.
5054

51-
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
55+
After administrators confirm the settings using [report-only mode](howto-conditional-access-insights-reporting.md), they can move the **Enable policy** toggle from **Report-only** to **On**.
5256

5357
## Next steps
5458

55-
[Remediate risks and unblock users](../identity-protection/howto-identity-protection-remediate-unblock.md)
56-
57-
[Conditional Access common policies](concept-conditional-access-policy-common.md)
58-
59-
[User risk-based Conditional Access](howto-conditional-access-policy-risk-user.md)
60-
61-
[Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
62-
63-
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
64-
65-
[What is Azure Active Directory Identity Protection?](../identity-protection/overview-identity-protection.md)
59+
- [Require reauthentication every time](../conditional-access/howto-conditional-access-session-lifetime.md#require-reauthentication-every-time)
60+
- [Remediate risks and unblock users](../identity-protection/howto-identity-protection-remediate-unblock.md)
61+
- [Conditional Access common policies](concept-conditional-access-policy-common.md)
62+
- [User risk-based Conditional Access](howto-conditional-access-policy-risk-user.md)
63+
- [Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
64+
- [Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
65+
- [What is Azure Active Directory Identity Protection?](../identity-protection/overview-identity-protection.md)

0 commit comments

Comments
 (0)