Skip to content

Commit 84a94db

Browse files
authored
Merge pull request #190201 from MicrosoftDocs/main
3/01 PM Publish
2 parents 13ae58d + 14d513c commit 84a94db

File tree

120 files changed

+2524
-1045
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

120 files changed

+2524
-1045
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -331,6 +331,8 @@
331331
displayName: TOTP, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
332332
- name: Partner integration
333333
items:
334+
- name: Transmit Security
335+
href: partner-bindid.md
334336
- name: BlokSec
335337
href: partner-bloksec.md
336338
- name: Haventec
76.7 KB
Loading
5.14 KB
Loading

articles/active-directory-b2c/partner-bindid.md

Lines changed: 342 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/partner-gallery.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
4141

4242
| ISV partner | Description and integration walkthroughs |
4343
|:-------------------------|:--------------|
44+
|![Screenshot of a bindid logo](./media/partner-gallery/bindid-logo.png) | [Transmit Security's](./partner-bindid.md) solution BindID is a passwordless authentication service that uses strong FIDO2 biometric authentication for a reliable omni-channel authentication experience, which ensures a smooth login experience for customers across every device and channel eliminating fraud, phishing, and credential reuse. |
4445
| ![Screenshot of a bloksec logo](./media/partner-gallery/bloksec-logo.png) | [BlokSec](./partner-bloksec.md) is a passwordless authentication and tokenless MFA solution, which provides real-time consent-based services and protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks. |
4546
| ![Screenshot of a haventec logo](./media/partner-gallery/haventec-logo.png) | [Haventec](./partner-haventec.md) is a passwordless authentication provider, which provides decentralized identity platform that eliminates passwords, shared secrets, and friction. |
4647
| ![Screenshot of a hypr logo](./media/partner-gallery/hypr-logo.png) | [Hypr](./partner-hypr.md) is a passwordless authentication provider, which replaces passwords with public key encryptions eliminating fraud, phishing, and credential reuse. |

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/16/2022
9+
ms.date: 03/1/2022
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: karenhoran
14-
ms.reviewer: rhicock
14+
ms.reviewer: tilarso
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -21,6 +21,7 @@ Before combined registration, users registered authentication methods for Azure
2121

2222
> [!NOTE]
2323
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration.
24+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to utilize the sepperate legacy registration workflows for MFA and SSPR.
2425
2526
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
2627

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -156,6 +156,10 @@ A major step in every multifactor authentication deployment is getting users reg
156156

157157
### Combined registration for SSPR and Azure AD MFA
158158

159+
> [!NOTE]
160+
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
161+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to disable the combined registration experience.
162+
159163
We recommend that organizations use the [combined registration experience for Azure AD Multi-Factor Authentication and self-service password reset (SSPR)](howto-registration-mfa-sspr-combined.md). SSPR allows users to reset their password in a secure way using the same methods they use for Azure AD Multi-Factor Authentication. Combined registration is a single step for end users. To make sure you understand the functionality and end-user experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
160164

161165
It's critical to inform users about upcoming changes, registration requirements, and any necessary user actions. We provide [communication templates](https://aka.ms/mfatemplates) and [user documentation](https://support.microsoft.com/account-billing/set-up-security-info-from-a-sign-in-page-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout. Send users to https://myprofile.microsoft.com to register by selecting the **Security Info** link on that page.

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/28/2021
9+
ms.date: 03/1/2022
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: karenhoran
14-
ms.reviewer: rhicock
14+
ms.reviewer: tilarso
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -21,6 +21,7 @@ Before combined registration, users registered authentication methods for Azure
2121

2222
> [!NOTE]
2323
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
24+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to utilize the sepperate legacy registration workflows for MFA and SSPR.
2425
2526
To make sure you understand the functionality and effects before you enable the new experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
2627

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,10 @@ Before deploying SSPR, you may opt to determine the number and the average cost
110110

111111
### Combined registration for SSPR and Azure AD Multi-Factor Authentication
112112

113+
> [!NOTE]
114+
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
115+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to disable the combined registration experience.
116+
113117
We recommend that organizations use the [combined registration experience for Azure AD Multi-Factor Authentication and self-service password reset (SSPR)](howto-registration-mfa-sspr-combined.md). SSPR allows users to reset their password in a secure way using the same methods they use for Azure AD Multi-Factor Authentication. Combined registration is a single step for end users. To make sure you understand the functionality and end-user experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
114118

115119
It's critical to inform users about upcoming changes, registration requirements, and any necessary user actions. We provide [communication templates](https://aka.ms/mfatemplates) and [user documentation](https://support.microsoft.com/account-billing/set-up-security-info-from-a-sign-in-page-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout. Send users to https://myprofile.microsoft.com to register by selecting the **Security Info** link on that page.

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-howto-add-remove-role-task.md

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -27,79 +27,79 @@ This article describes how you can add and remove roles and tasks for Microsoft
2727
## View permissions
2828

2929
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Permissions** subtab.
30-
1. From the **Select an authorization system type** dropdown, select **Azure** or **GCP**.
31-
1. From the **Select an authorization system** dropdown, select the accounts you want to access.
32-
1. From the **Search for** dropdown, select **Group**, **User**, or **APP**.
33-
1. To search for more parameters, you can make a selection from the **User States**, **Privilege Creep Index**, and **Task usage** dropdowns.
30+
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
31+
1. From the **Authorization System** dropdown, select the accounts you want to access.
32+
1. From the **Search For** dropdown, select **Group**, **User**, or **APP**.
33+
1. To search for more parameters, you can make a selection from the **User States**, **Permission Creep Index**, and **Task Usage** dropdowns.
3434
1. Select **Apply**.
3535
CloudKnox displays a list of groups, users, and service accounts that match your criteria.
3636
1. In **Enter a username**, enter or select a user.
37-
1. In **Enter a group name**, enter or select a group, then select **Apply**.
37+
1. In **Enter a Group Name**, enter or select a group, then select **Apply**.
3838
1. Make a selection from the results list.
3939

40-
The table displays the **Username** **Domain/Account**, **Source**, **Resource** and **Current role**.
40+
The table displays the **Username** **Domain/Account**, **Source**, **Resource** and **Current Role**.
4141

4242

4343
## Add a role
4444

4545
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Permissions** subtab.
46-
1. From the **Select an authorization system type** dropdown, select **Azure** or **GCP**.
47-
1. From the **Select an authorization system** dropdown, select the accounts you want to access.
48-
1. From the **Search for** dropdown, select **Group**, **User**, or **APP**, and then select **Apply**.
46+
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
47+
1. From the **Authorization System** dropdown, select the accounts you want to access.
48+
1. From the **Search For** dropdown, select **Group**, **User**, or **APP/Service Account**, and then select **Apply**.
4949
1. Make a selection from the results list.
5050

5151
1. To attach a role, select **Add role**.
52-
1. In the **Add role** page, from the **Available roles** list, select the plus sign **(+)** to move the role to the **Selected roles** list.
52+
1. In the **Add Role** page, from the **Available Roles** list, select the plus sign **(+)** to move the role to the **Selected Roles** list.
5353
1. When you have finished adding roles, select **Submit**.
54-
1. When the following message displays: **Are you sure you want to change permissions?**, select:
54+
1. When the following message displays: **Are you sure you want to change permission?**, select:
5555
- **Generate Script** to generate a script where you can manually add/remove the permissions you selected.
5656
- **Execute** to change the permission.
5757
- **Close** to cancel the action.
5858

5959
## Remove a role
6060

6161
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Permissions** subtab.
62-
1. From the **Select an authorization system type** dropdown, select **Azure** or **GCP**.
63-
1. From the **Select an authorization system** dropdown, select the accounts you want to access.
64-
1. From the **Search for** dropdown, select **Group**, **User**, or **APP**, and then select **Apply**.
62+
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
63+
1. From the **Authorization System** dropdown, select the accounts you want to access.
64+
1. From the **Search For** dropdown, select **Group**, **User**, or **APP/Service Account**, and then select **Apply**.
6565
1. Make a selection from the results list.
6666

67-
1. To remove a role, select **Remove role**.
68-
1. In the **Remove role** page, from the **Available roles** list, select the plus sign **(+)** to move the role to the **Selected roles** list.
67+
1. To remove a role, select **Remove Role**.
68+
1. In the **Remove Role** page, from the **Available Roles** list, select the plus sign **(+)** to move the role to the **Selected Roles** list.
6969
1. When you have finished selecting roles, select **Submit**.
70-
1. When the following message displays: **Are you sure you want to change permissions?**, select:
70+
1. When the following message displays: **Are you sure you want to change permission?**, select:
7171
- **Generate Script** to generate a script where you can manually add/remove the permissions you selected.
7272
- **Execute** to change the permission.
7373
- **Close** to cancel the action.
7474

7575
## Add a task
7676

7777
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Permissions** subtab.
78-
1. From the **Select an authorization system type** dropdown, select **Azure** or **GCP**.
79-
1. From the **Select an authorization system** dropdown, select the accounts you want to access.
80-
1. From the **Search for** dropdown, select **Group**, **User**, or **APP**, and then select **Apply**.
78+
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
79+
1. From the **Authorization System** dropdown, select the accounts you want to access.
80+
1. From the **Search For** dropdown, select **Group**, **User**, or **APP/Service Account**, and then select **Apply**.
8181
1. Make a selection from the results list.
8282

83-
1. To attach a role, select **Add tasks**.
84-
1. In the **Add tasks** page, from the **Available tasks** list, select the plus sign **(+)** to move the task to the **Selected tasks** list.
83+
1. To attach a role, select **Add Tasks**.
84+
1. In the **Add Tasks** page, from the **Available Tasks** list, select the plus sign **(+)** to move the task to the **Selected Tasks** list.
8585
1. When you have finished adding tasks, select **Submit**.
86-
1. When the following message displays: **Are you sure you want to change permissions?**, select:
86+
1. When the following message displays: **Are you sure you want to change permission?**, select:
8787
- **Generate Script** to generate a script where you can manually add/remove the permissions you selected.
8888
- **Execute** to change the permission.
8989
- **Close** to cancel the action.
9090

9191
## Remove a task
9292

9393
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Permissions** subtab.
94-
1. From the **Select an authorization system type** dropdown, select **Azure** or **GCP**.
95-
1. From the **Select an authorization system** dropdown, select the accounts you want to access.
96-
1. From the **Search for** dropdown, select **Group**, **User**, or **APP**, and then select **Apply**.
94+
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
95+
1. From the **Authorization System** dropdown, select the accounts you want to access.
96+
1. From the **Search For** dropdown, select **Group**, **User**, or **APP/Service Account**, and then select **Apply**.
9797
1. Make a selection from the results list.
9898

99-
1. To remove a task, select **Remove tasks**.
100-
1. In the **Remove tasks** page, from the **Available tasks** list, select the plus sign **(+)** to move the task to the **Selected tasks** list.
99+
1. To remove a task, select **Remove Tasks**.
100+
1. In the **Remove Tasks** page, from the **Available Tasks** list, select the plus sign **(+)** to move the task to the **Selected Tasks** list.
101101
1. When you have finished selecting tasks, select **Submit**.
102-
1. When the following message displays: **Are you sure you want to change permissions?**, select:
102+
1. When the following message displays: **Are you sure you want to change permission?**, select:
103103
- **Generate Script** to generate a script where you can manually add/remove the permissions you selected.
104104
- **Execute** to change the permission.
105105
- **Close** to cancel the action.

0 commit comments

Comments
 (0)