Skip to content

Commit 8b81707

Browse files
authored
Merge pull request #216748 from MicrosoftDocs/main
11/01 AM Publish
2 parents 0be1706 + 6d6c798 commit 8b81707

File tree

182 files changed

+3704
-1726
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

182 files changed

+3704
-1726
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -908,6 +908,7 @@
908908
".openpublishing.redirection.azure-percept.json",
909909
".openpublishing.redirection.azure-productivity.json",
910910
".openpublishing.redirection.azure-australia.json",
911+
".openpublishing.redirection.iot-hub-device-update.json",
911912
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
912913
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
913914
"articles/azure-relay/.openpublishing.redirection.relay.json",

.openpublishing.redirection.azure-monitor.json

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5465,30 +5465,31 @@
54655465
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-update-metrics.md",
54665466
"redirect_url": "/azure/azure-monitor/containers/container-insights-custom-metrics",
54675467
"redirect_document_id": false
5468-
}
5469-
,
5468+
},
54705469
{
54715470
"source_path_from_root": "/articles/automation/migrate-oms-update-deployments.md",
54725471
"redirect_url": "/azure/azure-monitor/terminology#april-2018---retirement-of-operations-management-suite-brand",
54735472
"redirect_document_id": false
5474-
}
5475-
,
5473+
},
54765474
{
54775475
"source_path_from_root": "/articles/azure-monitor/autoscale/autoscale-virtual-machine-scale-sets.md",
54785476
"redirect_url": "/azure/virtual-machine-scale-sets/tutorial-autoscale-template",
54795477
"redirect_document_id": false
5480-
}
5481-
,
5478+
},
54825479
{
54835480
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-common-schema-integrations.md",
54845481
"redirect_url": "/azure/azure-monitor/alerts/alerts-logic-apps",
54855482
"redirect_document_id": false
5486-
}
5487-
,
5483+
},
54885484
{
54895485
"source_path_from_root": "/articles/azure-monitor/alerts/action-groups-logic-app.md",
54905486
"redirect_url": "/azure/azure-monitor/alerts/alerts-logic-apps",
54915487
"redirect_document_id": false
5488+
},
5489+
{
5490+
"source_path_from_root": "/articles/azure-monitor/containers/container-insights-prometheus-metrics-addon.md",
5491+
"redirect_url": "/azure/azure-monitor/essentials/prometheus-metrics-enable",
5492+
"redirect_document_id": false
54925493
}
54935494
]
54945495
}
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/iot-hub-device-update/migration-pp-to-ppr.md",
5+
"redirect_url": "/azure/iot-hub-device-update/migration-public-preview-refresh-to-ga",
6+
"redirect_document_id": true
7+
}
8+
]
9+
}

articles/active-directory-b2c/TOC.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -249,9 +249,8 @@
249249
- name: Authentication options
250250
href: enable-authentication-in-node-web-app-with-api-options.md
251251
- name: Secure access to Web API (ASP.NET Core and Node.js)
252-
displayName: REST API
253-
- name: Enable authentication in your web API
254252
href: enable-authentication-web-api.md
253+
displayName: REST API
255254
- name: Secure API Management API
256255
href: secure-api-management.md
257256
displayName: api, api management, migrate, b2clogin.com

articles/active-directory-b2c/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ productDirectory:
8787

8888
## BAND 3 - CONCEPTUAL CONTENT #############################################################################################################################
8989
conceptualContent:
90-
title: Quickly access to Azure AD B2C documentation
90+
title: Quick access to Azure AD B2C documentation
9191
summary: Get quick access to our guides and tutorials for your most common scenarios.
9292
items:
9393
## CARD 1 ######################

articles/active-directory/authentication/howto-mfa-app-passwords.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/20/2022
9+
ms.date: 11/01/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -24,7 +24,7 @@ Modern authentication is supported for the Microsoft Office 2013 clients and lat
2424
This article shows you how to use app passwords for legacy applications that don't support multi-factor authentication prompts.
2525

2626
>[!NOTE]
27-
> App passwords don't work with Conditional Access based multi-factor authentication policies and modern authentication.
27+
> App passwords don't work with Conditional Access based multi-factor authentication policies and modern authentication. App passwords only work with legacy authentication protocols such as IMAP and SMTP.
2828
2929
## Overview and considerations
3030

articles/active-directory/authentication/howto-mfaserver-dir-ldap.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: LDAP Authentication and Azure MFA Server - Azure Active Directory
2+
title: LDAP Authentication and Azure Multi-Factor Authentication Server - Azure Active Directory
33
description: Deploying LDAP Authentication and Azure Multi-Factor Authentication Server.
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/11/2018
9+
ms.date: 10/31/2022
1010
ms.author: justinha
1111
author: justinha
1212
manager: amycolannino
@@ -16,16 +16,14 @@ ms.collection: M365-identity-device-management
1616
---
1717
# LDAP authentication and Azure Multi-Factor Authentication Server
1818

19-
By default, the Azure Multi-Factor Authentication Server is configured to import or synchronize users from Active Directory. However, it can be configured to bind to different LDAP directories, such as an ADAM directory, or specific Active Directory domain controller. When connected to a directory via LDAP, the Azure Multi-Factor Authentication Server can act as an LDAP proxy to perform authentications. It also allows for the use of LDAP bind as a RADIUS target, for pre-authentication of users with IIS Authentication, or for primary authentication in the Azure MFA user portal.
19+
By default, the Azure Multi-Factor Authentication Server is configured to import or synchronize users from Active Directory. However, it can be configured to bind to different LDAP directories, such as an ADAM directory, or specific Active Directory domain controller. When connected to a directory via LDAP, the Azure Multi-Factor Authentication Server can act as an LDAP proxy to perform authentications. Azure Multi-Factor Authentication Server can also use LDAP bind as a RADIUS target to pre-authenticate IIS users, or for primary authentication in the Azure Multi-Factor Authentication user portal.
2020

2121
To use Azure Multi-Factor Authentication as an LDAP proxy, insert the Azure Multi-Factor Authentication Server between the LDAP client (for example, VPN appliance, application) and the LDAP directory server. The Azure Multi-Factor Authentication Server must be configured to communicate with both the client servers and the LDAP directory. In this configuration, the Azure Multi-Factor Authentication Server accepts LDAP requests from client servers and applications and forwards them to the target LDAP directory server to validate the primary credentials. If the LDAP directory validates the primary credentials, Azure Multi-Factor Authentication performs a second identity verification and sends a response back to the LDAP client. The entire authentication succeeds only if both the LDAP server authentication and the second-step verification succeed.
2222

2323
> [!IMPORTANT]
24-
> As of July 1, 2019, Microsoft no longer offers MFA Server for new deployments. New customers that want to require multi-factor authentication (MFA) during sign-in events should use cloud-based Azure AD Multi-Factor Authentication.
24+
> In September 2022, Microsoft announced deprecation of Azure Multi-Factor Authentication Server. Beginning September 30, 2024, Azure Multi-Factor Authentication Server deployments will no longer service multifactor authentication (MFA) requests, which could cause authentications to fail for your organization. To ensure uninterrupted authentication services and to remain in a supported state, organizations should [migrate their users’ authentication data](how-to-migrate-mfa-server-to-azure-mfa-user-authentication.md) to the cloud-based Azure Multi-Factor Authentication service by using the latest Migration Utility included in the most recent [Azure Multi-Factor Authentication Server update](https://www.microsoft.com/download/details.aspx?id=55849). For more information, see [Azure Multi-Factor Authentication Server Migration](how-to-migrate-mfa-server-to-azure-mfa.md).
2525
>
26-
> To get started with cloud-based MFA, see [Tutorial: Secure user sign-in events with Azure AD Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
27-
>
28-
> Existing customers that activated MFA Server before July 1, 2019 can download the latest version, future updates, and generate activation credentials as usual.
26+
> To get started with cloud-based MFA, see [Tutorial: Secure user sign-in events with Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
2927
3028
## Configure LDAP authentication
3129

@@ -42,9 +40,9 @@ To configure LDAP authentication, install the Azure Multi-Factor Authentication
4240
4. If you plan to use LDAPS from the client to the Azure Multi-Factor Authentication Server, an TLS/SSL certificate must be installed on the same server as MFA Server. Click **Browse** next to the SSL (TLS) certificate box, and select a certificate to use for the secure connection.
4341
5. Click **Add**.
4442
6. In the Add LDAP Client dialog box, enter the IP address of the appliance, server, or application that authenticates to the Server and an Application name (optional). The Application name appears in Azure Multi-Factor Authentication reports and may be displayed within SMS or Mobile App authentication messages.
45-
7. Check the **Require Azure Multi-Factor Authentication user match** box if all users have been or will be imported into the Server and subject to two-step verification. If a significant number of users have not yet been imported into the Server and/or are exempt from two-step verification, leave the box unchecked. See the MFA Server help file for additional information on this feature.
43+
7. Check the **Require Azure Multi-Factor Authentication user match** box if all users have been or will be imported into the Server and subject to two-step verification. If a significant number of users haven't yet been imported into the Server and/or are exempt from two-step verification, leave the box unchecked. See the MFA Server help file for additional information on this feature.
4644

47-
Repeat these steps to add additional LDAP clients.
45+
Repeat these steps to add more LDAP clients.
4846

4947
### Configure the LDAP directory connection
5048

@@ -70,14 +68,14 @@ When the Azure Multi-Factor Authentication is configured to receive LDAP authent
7068
12. Click the **Company Settings** icon and select the **Username Resolution** tab.
7169
13. If you're connecting to Active Directory from a domain-joined server, leave the **Use Windows security identifiers (SIDs) for matching usernames** radio button selected. Otherwise, select the **Use LDAP unique identifier attribute for matching usernames** radio button.
7270

73-
When the **Use LDAP unique identifier attribute for matching usernames** radio button is selected, the Azure Multi-Factor Authentication Server attempts to resolve each username to a unique identifier in the LDAP directory. An LDAP search is performed on the Username attributes defined in the Directory Integration -> Attributes tab. When a user authenticates, the username is resolved to the unique identifier in the LDAP directory. The unique identifier is used for matching the user in the Azure Multi-Factor Authentication data file. This allows for case-insensitive comparisons, and long and short username formats.
71+
When the **Use LDAP unique identifier attribute for matching usernames** radio button is selected, the Azure Multi-Factor Authentication Server attempts to resolve each username to a unique identifier in the LDAP directory. An LDAP search is performed on the Username attributes defined in the Directory Integration > Attributes tab. When a user authenticates, the username is resolved to the unique identifier in the LDAP directory. The unique identifier is used for matching the user in the Azure Multi-Factor Authentication data file. This allows for case-insensitive comparisons, and long and short username formats.
7472

7573
After you complete these steps, the MFA Server listens on the configured ports for LDAP access requests from the configured clients, and acts as a proxy for those requests to the LDAP directory for authentication.
7674

7775
## Configure LDAP client
7876

7977
To configure the LDAP client, use the guidelines:
8078

81-
* Configure your appliance, server, or application to authenticate via LDAP to the Azure Multi-Factor Authentication Server as though it were your LDAP directory. Use the same settings that you would normally use to connect directly to your LDAP directory, except for the server name or IP address, which will be that of the Azure Multi-Factor Authentication Server.
82-
* Configure the LDAP timeout to 30-60 seconds so that there is time to validate the user's credentials with the LDAP directory, perform the second-step verification, receive their response, and respond to the LDAP access request.
79+
* Configure your appliance, server, or application to authenticate via LDAP to the Azure Multi-Factor Authentication Server as though it were your LDAP directory. Use the same settings that you normally use to connect directly to your LDAP directory, but use the Azure Multi-Factor Authentication Server for the server name or IP address.
80+
* Configure the LDAP timeout to 30-60 seconds to provide enough time to validate the user's credentials with the LDAP directory, perform the second-step verification, receive their response, and respond to the LDAP access request.
8381
* If using LDAPS, the appliance or server making the LDAP queries must trust the TLS/SSL certificate installed on the Azure Multi-Factor Authentication Server.

0 commit comments

Comments
 (0)