You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/tenant-management.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: celestedg
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: how-to
12
-
ms.date: 05/03/2021
12
+
ms.date: 05/18/2021
13
13
ms.custom: project-no-code
14
14
ms.author: mimart
15
15
ms.subservice: B2C
@@ -28,8 +28,8 @@ Azure AD B2C relies the Azure AD platform. The following Azure AD features can b
28
28
|[Groups](../active-directory/fundamentals/active-directory-groups-create-azure-portal.md)| Groups can be used to manage administrative and user accounts.| Groups can be used to manage administrative accounts. [Consumer accounts](user-overview.md#consumer-user) don't support groups. |
29
29
|[Inviting External Identities guests](../active-directory//external-identities/add-users-administrator.md)| You can invite guest users and configure External Identities features such as federation and sign-in with Facebook and Google accounts. | You can invite only a Microsoft account or an Azure AD user as a guest to your Azure AD tenant for accessing applications or managing tenants. For [consumer accounts](user-overview.md#consumer-user), you use Azure AD B2C user flows and custom policies to manage users and sign-up or sign-in with external identity providers, such as Google or Facebook. |
30
30
|[Roles and administrators](../active-directory/fundamentals/active-directory-users-assign-role-azure-portal.md)| Fully supported for administrative and user accounts. | Roles are not supported with [consumer accounts](user-overview.md#consumer-user). Consumer accounts don't have access to any Azure resources.|
31
-
|[Custom domain names](../active-directory/roles/permissions-reference.md#)| You can use Azure AD custom domains for administrative accounts only. |[Consumer accounts](user-overview.md#consumer-user) can sign in with a username, phone number, or any email address. You can use [custom domains](custom-domain.md) in your redirect URLs.|
32
-
|[Conditional Access](../active-directory/roles/permissions-reference.md#)| Fully supported for administrative and user accounts. | A subset of Azure AD Conditional Access features is supported with [consumer accounts](user-overview.md#consumer-user) Lean how to configure Azure AD B2C [custom domain](conditional-access-user-flow.md).|
31
+
|[Custom domain names](../active-directory/fundamentals/add-custom-domain.md)| You can use Azure AD custom domains for administrative accounts only. |[Consumer accounts](user-overview.md#consumer-user) can sign in with a username, phone number, or any email address. You can use [custom domains](custom-domain.md) in your redirect URLs.|
32
+
|[Conditional Access](../active-directory/conditional-access/overview.md)| Fully supported for administrative and user accounts. | A subset of Azure AD Conditional Access features is supported with [consumer accounts](user-overview.md#consumer-user) Lean how to configure Azure AD B2C [conditional access](conditional-access-user-flow.md).|
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-sync/tutorial-existing-forest.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,6 +64,9 @@ In this scenario, there is an existing forest synced using Azure AD Connect sync
64
64
9. On the **Configuration complete** screen, click **Confirm**. This operation will register and restart the agent.</br>
65
65
</br>
66
66
67
+
> [!NOTE]
68
+
> The group managed service account (for example, CONTOSO\provAgentgMSA$) is created in the same Active Directory domain where the host server has joined.
69
+
67
70
10. Once this operation completes you should see a notice: **Your agent configuration was successfully verified.** You can click **Exit**.</br>
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md
+43-12Lines changed: 43 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
-
title: Cloud apps or actions in Conditional Access policy - Azure Active Directory
3
-
description: What are cloud apps or actions in an Azure AD Conditional Access policy
2
+
title: Cloud apps, actions, and authentication context in Conditional Access policy - Azure Active Directory
3
+
description: What are cloud apps, actions, and authentication context in an Azure AD Conditional Access policy
4
4
5
5
services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: conceptual
9
-
ms.date: 10/16/2020
9
+
ms.date: 05/13/2021
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -15,14 +15,13 @@ ms.reviewer: calebb
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# Conditional Access: Cloud apps or actions
18
+
# Conditional Access: Cloud apps, actions, and authentication context
19
19
20
-
Cloud apps or actions are a key signal in a Conditional Access policy. Conditional Access policies allow administrators to assign controls to specific applicationsor actions.
20
+
Cloud apps, actions, and authentication context are key signals in a Conditional Access policy. Conditional Access policies allow administrators to assign controls to specific applications, actions, or authentication context.
21
21
22
22
- Administrators can choose from the list of applications that include built-in Microsoft applications and any [Azure AD integrated applications](../manage-apps/what-is-application-management.md) including gallery, non-gallery, and applications published through [Application Proxy](../manage-apps/what-is-application-proxy.md).
23
-
- Administrators may choose to define policy not based on a cloud application but on a user action. We support two user actions
24
-
- Register security information (preview) to enforce controls around the [combined security information registration experience](../authentication/howto-registration-mfa-sspr-combined.md)
25
-
- Register or join devices (preview) to enforce controls when users [register](../devices/concept-azure-ad-register.md) or [join](../devices/concept-azure-ad-join.md) devices to Azure AD.
23
+
- Administrators may choose to define policy not based on a cloud application but on a [user action](#user-actions) like **Register security information** or **Register or join devices (Preview)**, allowing Conditional Access to enforce controls around those actions.
24
+
- Administrators can use [authentication context](#authentication-context-preview) to provide an extra layer of security inside of applications.
26
25
27
26

28
27
@@ -68,7 +67,7 @@ Administrators can assign a Conditional Access policy to the following cloud app
68
67
- Virtual Private Network (VPN)
69
68
- Windows Defender ATP
70
69
71
-
Applications that are available to Conditional Access have gone through an onboarding and validation process. This does not include all Microsoft apps, as many are backend services and not meant to have policy directly applied to them. If you are looking for an application that is missing, you can contact the specific application team or make a request on [UserVoice](https://feedback.azure.com/forums/169401-azure-active-directory?category_id=167259).
70
+
Applications that are available to Conditional Access have gone through an onboarding and validation process. This list does not include all Microsoft apps, as many are backend services and not meant to have policy directly applied to them. If you are looking for an application that is missing, you can contact the specific application team or make a request on [UserVoice](https://feedback.azure.com/forums/169401-azure-active-directory?category_id=167259).
72
71
73
72
### Office 365
74
73
@@ -113,7 +112,7 @@ The Microsoft Azure Management application includes multiple underlying services
113
112
> [!NOTE]
114
113
> The Microsoft Azure Management application applies to Azure PowerShell, which calls the Azure Resource Manager API. It does not apply to Azure AD PowerShell, which calls Microsoft Graph.
115
114
116
-
## Other applications
115
+
###Other applications
117
116
118
117
In addition to the Microsoft apps, administrators can add any Azure AD registered application to Conditional Access policies. These applications may include:
119
118
@@ -136,10 +135,42 @@ User actions are tasks that can be performed by a user. Currently, Conditional A
136
135
-`Require multi-factor authentication` is the only access control available with this user action and all others are disabled. This restriction prevents conflicts with access controls that are either dependent on Azure AD device registration or not applicable to Azure AD device registration.
137
136
-`Client apps` and `Device state` conditions are not available with this user action since they are dependent on Azure AD device registration to enforce Conditional Access policies.
138
137
- When a Conditional Access policy is enabled with this user action, you must set **Azure Active Directory** > **Devices** > **Device Settings** - `Devices to be Azure AD joined or Azure AD registered require Multi-Factor Authentication` to **No**. Otherwise, the Conditional Access policy with this user action is not properly enforced. More information regarding this device setting can found in [Configure device settings](../devices/device-management-azure-portal.md#configure-device-settings).
139
-
138
+
139
+
## Authentication context (Preview)
140
+
141
+
Authentication context can be used to further secure data and actions in applications. These applications can be your own custom applications, custom line of business (LOB) applications, applications like SharePoint, or applications protected by Microsoft Cloud App Security (MCAS).
142
+
143
+
For example, an organization may keep different files in SharePoint like the lunch menu or their secret BBQ sauce recipe. Everyone may have access to the lunch menu, but users who have access to the secret BBQ sauce recipe may need to access from a managed device and agree to specific terms of use.
144
+
145
+
### Configure authentication contexts
146
+
147
+
Authentication contexts are managed in the Azure portal under **Azure Active Directory** > **Security** > **Conditional Access** > **Authentication context**.
148
+
149
+

150
+
151
+
> [!WARNING]
152
+
> * Deleting authentication context definitions is not possible during the preview.
153
+
> * The preview is limited to a total of 25 authentication context definitions in the Azure portal.
154
+
155
+
Create new authentication context definitions by selecting **New authentication context** in the Azure portal. Configure the following attributes:
156
+
157
+
-**Display name** is the name that is used to identify the authentication context in Azure AD and across applications that consume authentication contexts. We recommend names that can be used across resources, like “trusted devices”, to reduce the number of authentication contexts needed. Having a reduced set limits the number of redirects and provides a better end to end-user experience.
158
+
-**Description** provides more information about the policies it is used by Azure AD administrators and those applying authentication contexts to resources.
159
+
-**Publish to apps** checkbox when checked, advertises the authentication context to apps and makes them available to be assigned. If not checked the authentication context will be unavailable to downstream resources.
160
+
-**ID** is read-only and used in tokens and apps for request-specific authentication context definitions. It is listed here for troubleshooting and development use cases.
161
+
162
+
Administrators can then select published authentication contexts in their Conditional Access policies under **Assignments** > **Cloud apps or actions** > **Authentication context**.
163
+
164
+
### Tag resources with authentication contexts
165
+
166
+
For more information about authentication context use in applications, see the following articles.
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-conditional-access-policies.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ The assignments portion controls the who, what, and where of the Conditional Acc
52
52
53
53
### Cloud apps or actions
54
54
55
-
[Cloud apps or actions](concept-conditional-access-cloud-apps.md) can include or exclude cloud applications or user actionsthat will be subject to the policy.
55
+
[Cloud apps or actions](concept-conditional-access-cloud-apps.md) can include or exclude cloud applications, user actions, or authentication contexts that will be subjected to the policy.
0 commit comments