You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-gallery.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,6 +41,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
41
41
42
42
| ISV partner | Description and integration walkthroughs |
43
43
|:-------------------------|:--------------|
44
+
||[Transmit Security's](./partner-bindid.md) solution BindID is a passwordless authentication service that uses strong FIDO2 biometric authentication for a reliable omni-channel authentication experience, which ensures a smooth login experience for customers across every device and channel eliminating fraud, phishing, and credential reuse. |
44
45
||[BlokSec](./partner-bloksec.md) is a passwordless authentication and tokenless MFA solution, which provides real-time consent-based services and protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks. |
45
46
||[Haventec](./partner-haventec.md) is a passwordless authentication provider, which provides decentralized identity platform that eliminates passwords, shared secrets, and friction. |
46
47
||[Hypr](./partner-hypr.md) is a passwordless authentication provider, which replaces passwords with public key encryptions eliminating fraud, phishing, and credential reuse. |
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,12 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 02/16/2022
9
+
ms.date: 03/1/2022
10
10
11
11
ms.author: justinha
12
12
author: justinha
13
13
manager: karenhoran
14
-
ms.reviewer: rhicock
14
+
ms.reviewer: tilarso
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
@@ -21,6 +21,7 @@ Before combined registration, users registered authentication methods for Azure
21
21
22
22
> [!NOTE]
23
23
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration.
24
+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to utilize the sepperate legacy registration workflows for MFA and SSPR.
24
25
25
26
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-getstarted.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -156,6 +156,10 @@ A major step in every multifactor authentication deployment is getting users reg
156
156
157
157
### Combined registration for SSPR and Azure AD MFA
158
158
159
+
> [!NOTE]
160
+
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
161
+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to disable the combined registration experience.
162
+
159
163
We recommend that organizations use the [combined registration experience for Azure AD Multi-Factor Authentication and self-service password reset (SSPR)](howto-registration-mfa-sspr-combined.md). SSPR allows users to reset their password in a secure way using the same methods they use for Azure AD Multi-Factor Authentication. Combined registration is a single step for end users. To make sure you understand the functionality and end-user experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
160
164
161
165
It's critical to inform users about upcoming changes, registration requirements, and any necessary user actions. We provide [communication templates](https://aka.ms/mfatemplates) and [user documentation](https://support.microsoft.com/account-billing/set-up-security-info-from-a-sign-in-page-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout. Send users to https://myprofile.microsoft.com to register by selecting the **Security Info** link on that page.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,12 +6,12 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 06/28/2021
9
+
ms.date: 03/1/2022
10
10
11
11
ms.author: justinha
12
12
author: justinha
13
13
manager: karenhoran
14
-
ms.reviewer: rhicock
14
+
ms.reviewer: tilarso
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
@@ -21,6 +21,7 @@ Before combined registration, users registered authentication methods for Azure
21
21
22
22
> [!NOTE]
23
23
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
24
+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to utilize the sepperate legacy registration workflows for MFA and SSPR.
24
25
25
26
To make sure you understand the functionality and effects before you enable the new experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-sspr-deployment.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,6 +110,10 @@ Before deploying SSPR, you may opt to determine the number and the average cost
110
110
111
111
### Combined registration for SSPR and Azure AD Multi-Factor Authentication
112
112
113
+
> [!NOTE]
114
+
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
115
+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to disable the combined registration experience.
116
+
113
117
We recommend that organizations use the [combined registration experience for Azure AD Multi-Factor Authentication and self-service password reset (SSPR)](howto-registration-mfa-sspr-combined.md). SSPR allows users to reset their password in a secure way using the same methods they use for Azure AD Multi-Factor Authentication. Combined registration is a single step for end users. To make sure you understand the functionality and end-user experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
114
118
115
119
It's critical to inform users about upcoming changes, registration requirements, and any necessary user actions. We provide [communication templates](https://aka.ms/mfatemplates) and [user documentation](https://support.microsoft.com/account-billing/set-up-security-info-from-a-sign-in-page-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout. Send users to https://myprofile.microsoft.com to register by selecting the **Security Info** link on that page.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-howto-add-remove-role-task.md
+29-29Lines changed: 29 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,79 +27,79 @@ This article describes how you can add and remove roles and tasks for Microsoft
27
27
## View permissions
28
28
29
29
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Permissions** subtab.
30
-
1. From the **Select an authorization system type** dropdown, select **Azure** or **GCP**.
31
-
1. From the **Select an authorization system** dropdown, select the accounts you want to access.
32
-
1. From the **Search for** dropdown, select **Group**, **User**, or **APP**.
33
-
1. To search for more parameters, you can make a selection from the **User States**, **Privilege Creep Index**, and **Task usage** dropdowns.
30
+
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
31
+
1. From the **Authorization System** dropdown, select the accounts you want to access.
32
+
1. From the **Search For** dropdown, select **Group**, **User**, or **APP**.
33
+
1. To search for more parameters, you can make a selection from the **User States**, **Permission Creep Index**, and **Task Usage** dropdowns.
34
34
1. Select **Apply**.
35
35
CloudKnox displays a list of groups, users, and service accounts that match your criteria.
36
36
1. In **Enter a username**, enter or select a user.
37
-
1. In **Enter a group name**, enter or select a group, then select **Apply**.
37
+
1. In **Enter a Group Name**, enter or select a group, then select **Apply**.
38
38
1. Make a selection from the results list.
39
39
40
-
The table displays the **Username****Domain/Account**, **Source**, **Resource** and **Current role**.
40
+
The table displays the **Username****Domain/Account**, **Source**, **Resource** and **Current Role**.
41
41
42
42
43
43
## Add a role
44
44
45
45
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Permissions** subtab.
46
-
1. From the **Select an authorization system type** dropdown, select **Azure** or **GCP**.
47
-
1. From the **Select an authorization system** dropdown, select the accounts you want to access.
48
-
1. From the **Search for** dropdown, select **Group**, **User**, or **APP**, and then select **Apply**.
46
+
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
47
+
1. From the **Authorization System** dropdown, select the accounts you want to access.
48
+
1. From the **Search For** dropdown, select **Group**, **User**, or **APP/Service Account**, and then select **Apply**.
49
49
1. Make a selection from the results list.
50
50
51
51
1. To attach a role, select **Add role**.
52
-
1. In the **Add role** page, from the **Available roles** list, select the plus sign **(+)** to move the role to the **Selected roles** list.
52
+
1. In the **Add Role** page, from the **Available Roles** list, select the plus sign **(+)** to move the role to the **Selected Roles** list.
53
53
1. When you have finished adding roles, select **Submit**.
54
-
1. When the following message displays: **Are you sure you want to change permissions?**, select:
54
+
1. When the following message displays: **Are you sure you want to change permission?**, select:
55
55
-**Generate Script** to generate a script where you can manually add/remove the permissions you selected.
56
56
-**Execute** to change the permission.
57
57
-**Close** to cancel the action.
58
58
59
59
## Remove a role
60
60
61
61
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Permissions** subtab.
62
-
1. From the **Select an authorization system type** dropdown, select **Azure** or **GCP**.
63
-
1. From the **Select an authorization system** dropdown, select the accounts you want to access.
64
-
1. From the **Search for** dropdown, select **Group**, **User**, or **APP**, and then select **Apply**.
62
+
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
63
+
1. From the **Authorization System** dropdown, select the accounts you want to access.
64
+
1. From the **Search For** dropdown, select **Group**, **User**, or **APP/Service Account**, and then select **Apply**.
65
65
1. Make a selection from the results list.
66
66
67
-
1. To remove a role, select **Remove role**.
68
-
1. In the **Remove role** page, from the **Available roles** list, select the plus sign **(+)** to move the role to the **Selected roles** list.
67
+
1. To remove a role, select **Remove Role**.
68
+
1. In the **Remove Role** page, from the **Available Roles** list, select the plus sign **(+)** to move the role to the **Selected Roles** list.
69
69
1. When you have finished selecting roles, select **Submit**.
70
-
1. When the following message displays: **Are you sure you want to change permissions?**, select:
70
+
1. When the following message displays: **Are you sure you want to change permission?**, select:
71
71
-**Generate Script** to generate a script where you can manually add/remove the permissions you selected.
72
72
-**Execute** to change the permission.
73
73
-**Close** to cancel the action.
74
74
75
75
## Add a task
76
76
77
77
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Permissions** subtab.
78
-
1. From the **Select an authorization system type** dropdown, select **Azure** or **GCP**.
79
-
1. From the **Select an authorization system** dropdown, select the accounts you want to access.
80
-
1. From the **Search for** dropdown, select **Group**, **User**, or **APP**, and then select **Apply**.
78
+
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
79
+
1. From the **Authorization System** dropdown, select the accounts you want to access.
80
+
1. From the **Search For** dropdown, select **Group**, **User**, or **APP/Service Account**, and then select **Apply**.
81
81
1. Make a selection from the results list.
82
82
83
-
1. To attach a role, select **Add tasks**.
84
-
1. In the **Add tasks** page, from the **Available tasks** list, select the plus sign **(+)** to move the task to the **Selected tasks** list.
83
+
1. To attach a role, select **Add Tasks**.
84
+
1. In the **Add Tasks** page, from the **Available Tasks** list, select the plus sign **(+)** to move the task to the **Selected Tasks** list.
85
85
1. When you have finished adding tasks, select **Submit**.
86
-
1. When the following message displays: **Are you sure you want to change permissions?**, select:
86
+
1. When the following message displays: **Are you sure you want to change permission?**, select:
87
87
-**Generate Script** to generate a script where you can manually add/remove the permissions you selected.
88
88
-**Execute** to change the permission.
89
89
-**Close** to cancel the action.
90
90
91
91
## Remove a task
92
92
93
93
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Permissions** subtab.
94
-
1. From the **Select an authorization system type** dropdown, select **Azure** or **GCP**.
95
-
1. From the **Select an authorization system** dropdown, select the accounts you want to access.
96
-
1. From the **Search for** dropdown, select **Group**, **User**, or **APP**, and then select **Apply**.
94
+
1. From the **Authorization System Type** dropdown, select **Azure** or **GCP**.
95
+
1. From the **Authorization System** dropdown, select the accounts you want to access.
96
+
1. From the **Search For** dropdown, select **Group**, **User**, or **APP/Service Account**, and then select **Apply**.
97
97
1. Make a selection from the results list.
98
98
99
-
1. To remove a task, select **Remove tasks**.
100
-
1. In the **Remove tasks** page, from the **Available tasks** list, select the plus sign **(+)** to move the task to the **Selected tasks** list.
99
+
1. To remove a task, select **Remove Tasks**.
100
+
1. In the **Remove Tasks** page, from the **Available Tasks** list, select the plus sign **(+)** to move the task to the **Selected Tasks** list.
101
101
1. When you have finished selecting tasks, select **Submit**.
102
-
1. When the following message displays: **Are you sure you want to change permissions?**, select:
102
+
1. When the following message displays: **Are you sure you want to change permission?**, select:
103
103
-**Generate Script** to generate a script where you can manually add/remove the permissions you selected.
0 commit comments