Skip to content

Commit 83cf64d

Browse files
authored
Merge pull request #159201 from MicrosoftDocs/master
Merge master to live, 4 AM
2 parents cbbd768 + d1912b2 commit 83cf64d

File tree

166 files changed

+2220
-1236
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

166 files changed

+2220
-1236
lines changed

CODEOWNERS

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,9 @@ articles/ddos-protection @aletheatoh @anupamvi
8282
# Lighthouse
8383
articles/lighthouse/ @JnHs
8484

85+
# Healthcare APIs
86+
articles/healthcare-apis/ @ginalee-dotcom
87+
8588
# Configuration
8689
*.json @SyntaxC4 @snoviking @martinekuan
8790
.acrolinx-config.edn @MonicaRush @martinekuan

articles/active-directory-b2c/tenant-management.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 05/03/2021
12+
ms.date: 05/18/2021
1313
ms.custom: project-no-code
1414
ms.author: mimart
1515
ms.subservice: B2C
@@ -28,8 +28,8 @@ Azure AD B2C relies the Azure AD platform. The following Azure AD features can b
2828
| [Groups](../active-directory/fundamentals/active-directory-groups-create-azure-portal.md) | Groups can be used to manage administrative and user accounts.| Groups can be used to manage administrative accounts. [Consumer accounts](user-overview.md#consumer-user) don't support groups. |
2929
| [Inviting External Identities guests](../active-directory//external-identities/add-users-administrator.md)| You can invite guest users and configure External Identities features such as federation and sign-in with Facebook and Google accounts. | You can invite only a Microsoft account or an Azure AD user as a guest to your Azure AD tenant for accessing applications or managing tenants. For [consumer accounts](user-overview.md#consumer-user), you use Azure AD B2C user flows and custom policies to manage users and sign-up or sign-in with external identity providers, such as Google or Facebook. |
3030
| [Roles and administrators](../active-directory/fundamentals/active-directory-users-assign-role-azure-portal.md)| Fully supported for administrative and user accounts. | Roles are not supported with [consumer accounts](user-overview.md#consumer-user). Consumer accounts don't have access to any Azure resources.|
31-
| [Custom domain names](../active-directory/roles/permissions-reference.md#) | You can use Azure AD custom domains for administrative accounts only. | [Consumer accounts](user-overview.md#consumer-user) can sign in with a username, phone number, or any email address. You can use [custom domains](custom-domain.md) in your redirect URLs.|
32-
| [Conditional Access](../active-directory/roles/permissions-reference.md#) | Fully supported for administrative and user accounts. | A subset of Azure AD Conditional Access features is supported with [consumer accounts](user-overview.md#consumer-user) Lean how to configure Azure AD B2C [custom domain](conditional-access-user-flow.md).|
31+
| [Custom domain names](../active-directory/fundamentals/add-custom-domain.md) | You can use Azure AD custom domains for administrative accounts only. | [Consumer accounts](user-overview.md#consumer-user) can sign in with a username, phone number, or any email address. You can use [custom domains](custom-domain.md) in your redirect URLs.|
32+
| [Conditional Access](../active-directory/conditional-access/overview.md) | Fully supported for administrative and user accounts. | A subset of Azure AD Conditional Access features is supported with [consumer accounts](user-overview.md#consumer-user) Lean how to configure Azure AD B2C [conditional access](conditional-access-user-flow.md).|
3333

3434
## Other Azure resources in your tenant
3535

articles/active-directory/cloud-sync/tutorial-existing-forest.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,9 @@ In this scenario, there is an existing forest synced using Azure AD Connect sync
6464
9. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
6565
![Screenshot that shows the "Configuration complete" screen.](media/how-to-install/install-4a.png)</br>
6666

67+
> [!NOTE]
68+
> The group managed service account (for example, CONTOSO\provAgentgMSA$) is created in the same Active Directory domain where the host server has joined.
69+
6770
10. Once this operation completes you should see a notice: **Your agent configuration was successfully verified.** You can click **Exit**.</br>
6871
![Welcome screen](media/how-to-install/install-5.png)</br>
6972
11. If you still see the initial splash screen, click **Close**.
@@ -128,4 +131,4 @@ You have now successfully set up a hybrid identity environment that you can use
128131
## Next steps
129132

130133
- [What is provisioning?](what-is-provisioning.md)
131-
- [What is Azure AD Connect cloud sync?](what-is-cloud-sync.md)
134+
- [What is Azure AD Connect cloud sync?](what-is-cloud-sync.md)

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 43 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Cloud apps or actions in Conditional Access policy - Azure Active Directory
3-
description: What are cloud apps or actions in an Azure AD Conditional Access policy
2+
title: Cloud apps, actions, and authentication context in Conditional Access policy - Azure Active Directory
3+
description: What are cloud apps, actions, and authentication context in an Azure AD Conditional Access policy
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 10/16/2020
9+
ms.date: 05/13/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -15,14 +15,13 @@ ms.reviewer: calebb
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Conditional Access: Cloud apps or actions
18+
# Conditional Access: Cloud apps, actions, and authentication context
1919

20-
Cloud apps or actions are a key signal in a Conditional Access policy. Conditional Access policies allow administrators to assign controls to specific applications or actions.
20+
Cloud apps, actions, and authentication context are key signals in a Conditional Access policy. Conditional Access policies allow administrators to assign controls to specific applications, actions, or authentication context.
2121

2222
- Administrators can choose from the list of applications that include built-in Microsoft applications and any [Azure AD integrated applications](../manage-apps/what-is-application-management.md) including gallery, non-gallery, and applications published through [Application Proxy](../manage-apps/what-is-application-proxy.md).
23-
- Administrators may choose to define policy not based on a cloud application but on a user action. We support two user actions
24-
- Register security information (preview) to enforce controls around the [combined security information registration experience](../authentication/howto-registration-mfa-sspr-combined.md)
25-
- Register or join devices (preview) to enforce controls when users [register](../devices/concept-azure-ad-register.md) or [join](../devices/concept-azure-ad-join.md) devices to Azure AD.
23+
- Administrators may choose to define policy not based on a cloud application but on a [user action](#user-actions) like **Register security information** or **Register or join devices (Preview)**, allowing Conditional Access to enforce controls around those actions.
24+
- Administrators can use [authentication context](#authentication-context-preview) to provide an extra layer of security inside of applications.
2625

2726
![Define a Conditional Access policy and specify cloud apps](./media/concept-conditional-access-cloud-apps/conditional-access-cloud-apps-or-actions.png)
2827

@@ -68,7 +67,7 @@ Administrators can assign a Conditional Access policy to the following cloud app
6867
- Virtual Private Network (VPN)
6968
- Windows Defender ATP
7069

71-
Applications that are available to Conditional Access have gone through an onboarding and validation process. This does not include all Microsoft apps, as many are backend services and not meant to have policy directly applied to them. If you are looking for an application that is missing, you can contact the specific application team or make a request on [UserVoice](https://feedback.azure.com/forums/169401-azure-active-directory?category_id=167259).
70+
Applications that are available to Conditional Access have gone through an onboarding and validation process. This list does not include all Microsoft apps, as many are backend services and not meant to have policy directly applied to them. If you are looking for an application that is missing, you can contact the specific application team or make a request on [UserVoice](https://feedback.azure.com/forums/169401-azure-active-directory?category_id=167259).
7271

7372
### Office 365
7473

@@ -113,7 +112,7 @@ The Microsoft Azure Management application includes multiple underlying services
113112
> [!NOTE]
114113
> The Microsoft Azure Management application applies to Azure PowerShell, which calls the Azure Resource Manager API. It does not apply to Azure AD PowerShell, which calls Microsoft Graph.
115114
116-
## Other applications
115+
### Other applications
117116

118117
In addition to the Microsoft apps, administrators can add any Azure AD registered application to Conditional Access policies. These applications may include:
119118

@@ -136,10 +135,42 @@ User actions are tasks that can be performed by a user. Currently, Conditional A
136135
- `Require multi-factor authentication` is the only access control available with this user action and all others are disabled. This restriction prevents conflicts with access controls that are either dependent on Azure AD device registration or not applicable to Azure AD device registration.
137136
- `Client apps` and `Device state` conditions are not available with this user action since they are dependent on Azure AD device registration to enforce Conditional Access policies.
138137
- When a Conditional Access policy is enabled with this user action, you must set **Azure Active Directory** > **Devices** > **Device Settings** - `Devices to be Azure AD joined or Azure AD registered require Multi-Factor Authentication` to **No**. Otherwise, the Conditional Access policy with this user action is not properly enforced. More information regarding this device setting can found in [Configure device settings](../devices/device-management-azure-portal.md#configure-device-settings).
139-
138+
139+
## Authentication context (Preview)
140+
141+
Authentication context can be used to further secure data and actions in applications. These applications can be your own custom applications, custom line of business (LOB) applications, applications like SharePoint, or applications protected by Microsoft Cloud App Security (MCAS).
142+
143+
For example, an organization may keep different files in SharePoint like the lunch menu or their secret BBQ sauce recipe. Everyone may have access to the lunch menu, but users who have access to the secret BBQ sauce recipe may need to access from a managed device and agree to specific terms of use.
144+
145+
### Configure authentication contexts
146+
147+
Authentication contexts are managed in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access** > **Authentication context**.
148+
149+
![Manage authentication context in the Azure portal](./media/concept-conditional-access-cloud-apps/conditional-access-authentication-context-get-started.png)
150+
151+
> [!WARNING]
152+
> * Deleting authentication context definitions is not possible during the preview.
153+
> * The preview is limited to a total of 25 authentication context definitions in the Azure portal.
154+
155+
Create new authentication context definitions by selecting **New authentication context** in the Azure portal. Configure the following attributes:
156+
157+
- **Display name** is the name that is used to identify the authentication context in Azure AD and across applications that consume authentication contexts. We recommend names that can be used across resources, like “trusted devices”, to reduce the number of authentication contexts needed. Having a reduced set limits the number of redirects and provides a better end to end-user experience.
158+
- **Description** provides more information about the policies it is used by Azure AD administrators and those applying authentication contexts to resources.
159+
- **Publish to apps** checkbox when checked, advertises the authentication context to apps and makes them available to be assigned. If not checked the authentication context will be unavailable to downstream resources.
160+
- **ID** is read-only and used in tokens and apps for request-specific authentication context definitions. It is listed here for troubleshooting and development use cases.
161+
162+
Administrators can then select published authentication contexts in their Conditional Access policies under **Assignments** > **Cloud apps or actions** > **Authentication context**.
163+
164+
### Tag resources with authentication contexts
165+
166+
For more information about authentication context use in applications, see the following articles.
167+
168+
- [SharePoint Online](/microsoft-365/compliance/sensitivity-labels-teams-groups-sites?view=o365-worldwide#more-information-about-the-dependencies-for-the-authentication-context-option)
169+
- [Microsoft Cloud App Security](/cloud-app-security/session-policy-aad?branch=pr-en-us-2082#require-step-up-authentication-authentication-context)
170+
- Custom applications
171+
140172
## Next steps
141173

142174
- [Conditional Access: Conditions](concept-conditional-access-conditions.md)
143-
144175
- [Conditional Access common policies](concept-conditional-access-policy-common.md)
145176
- [Client application dependencies](service-dependencies.md)

articles/active-directory/conditional-access/concept-conditional-access-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The assignments portion controls the who, what, and where of the Conditional Acc
5252

5353
### Cloud apps or actions
5454

55-
[Cloud apps or actions](concept-conditional-access-cloud-apps.md) can include or exclude cloud applications or user actions that will be subject to the policy.
55+
[Cloud apps or actions](concept-conditional-access-cloud-apps.md) can include or exclude cloud applications, user actions, or authentication contexts that will be subjected to the policy.
5656

5757
### Conditions
5858

articles/active-directory/conditional-access/concept-conditional-access-policy-common.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 07/02/2020
9+
ms.date: 05/13/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: daveba
14-
ms.reviewer: calebb, rogoya
14+
ms.reviewer: calebb
1515

1616
ms.collection: M365-identity-device-management
1717
---
Loading
Loading
Loading
Loading

0 commit comments

Comments
 (0)