You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/active-directory-certificate-based-authentication-android.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
-
title: Android certificate-based authentication - Azure Active Directory
2
+
title: Android certificate-based authentication with federation - Azure Active Directory
3
3
description: Learn about the supported scenarios and the requirements for configuring certificate-based authentication in solutions with Android devices
4
4
5
5
services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: how-to
9
-
ms.date: 02/16/2022
9
+
ms.date: 09/30/2022
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -15,7 +15,7 @@ ms.reviewer: annaba
15
15
16
16
ms.collection: M365-identity-device-management
17
17
---
18
-
# Azure Active Directory certificate-based authentication on Android
18
+
# Azure Active Directory certificate-based authentication with federation on Android
19
19
20
20
Android devices can use certificate-based authentication (CBA) to authenticate to Azure Active Directory using a client certificate on their device when connecting to:
21
21
@@ -46,26 +46,28 @@ The device OS version must be Android 5.0 (Lollipop) and above.
46
46
47
47
A federation server must be configured.
48
48
49
-
For Azure Active Directory to revoke a client certificate, the ADFS token must have the following claims:
49
+
For Azure Active Directory to revoke a client certificate, the AD FS token must have the following claims:
(The string for the issuer of the client certificate)
55
55
56
-
Azure Active Directory adds these claims to the refresh token if they are available in the ADFS token (or any other SAML token). When the refresh token needs to be validated, this information is used to check the revocation.
56
+
Azure Active Directory adds these claims to the refresh token if they're available in the AD FS token (or any other SAML token). When the refresh token needs to be validated, this information is used to check the revocation.
57
57
58
-
As a best practice, you should update your organization's ADFS error pages with the following information:
58
+
As a best practice, you should update your organization's AD FS error pages with the following information:
59
59
60
60
* The requirement for installing the Microsoft Authenticator on Android.
61
61
* Instructions on how to get a user certificate.
62
62
63
63
For more information, see [Customizing the AD FS Sign-in Pages](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn280950(v=ws.11)).
64
64
65
-
Some Office apps (with modern authentication enabled) send '*prompt=login*' to Azure AD in their request. By default, Azure AD translates '*prompt=login*' in the request to ADFS as '*wauth=usernamepassworduri*' (asks ADFS to do U/P Auth) and '*wfresh=0*' (asks ADFS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, you need to modify the default Azure AD behavior. Set the '*PromptLoginBehavior*' in your federated domain settings to '*Disabled*'.
65
+
Office apps with modern authentication enabled send '*prompt=login*' to Azure AD in their request. By default, Azure AD translates '*prompt=login*' in the request to AD FS as '*wauth=usernamepassworduri*' (asks AD FS to do U/P Auth) and '*wfresh=0*' (asks AD FS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, you need to modify the default Azure AD behavior. Set the '*PromptLoginBehavior*' in your federated domain settings to '*Disabled*'.
66
66
You can use the [MSOLDomainFederationSettings](/powershell/module/msonline/set-msoldomainfederationsettings) cmdlet to perform this task:
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/active-directory-certificate-based-authentication-ios.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,20 +1,20 @@
1
1
---
2
-
title: Certificate-based authentication on iOS - Azure Active Directory
2
+
title: Certificate-based authentication with federation on iOS - Azure Active Directory
3
3
description: Learn about the supported scenarios and the requirements for configuring certificate-based authentication for Azure Active Directory in solutions with iOS devices
4
4
5
5
services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 05/04/2022
9
+
ms.date: 09/30/2022
10
10
11
11
ms.author: justinha
12
12
author: justinha
13
13
manager: amycolannino
14
14
15
15
ms.collection: M365-identity-device-management
16
16
---
17
-
# Azure Active Directory certificate-based authentication on iOS
17
+
# Azure Active Directory certificate-based authentication with federation on iOS
18
18
19
19
To improve security, iOS devices can use certificate-based authentication (CBA) to authenticate to Azure Active Directory (Azure AD) using a client certificate on their device when connecting to the following applications or services:
20
20
@@ -46,21 +46,21 @@ To use CBA with iOS, the following requirements and considerations apply:
46
46
47
47
* The device OS version must be iOS 9 or above.
48
48
* Microsoft Authenticator is required for Office applications on iOS.
49
-
* An identity preference must be created in the macOS Keychain that include the authentication URL of the ADFS server. For more information, see [Create an identity preference in Keychain Access on Mac](https://support.apple.com/guide/keychain-access/create-an-identity-preference-kyca6343b6c9/mac).
49
+
* An identity preference must be created in the macOS Keychain that includes the authentication URL of the AD FS server. For more information, see [Create an identity preference in Keychain Access on Mac](https://support.apple.com/guide/keychain-access/create-an-identity-preference-kyca6343b6c9/mac).
50
50
51
-
The following Active Directory Federation Services (ADFS) requirements and considerations apply:
51
+
The following Active Directory Federation Services (AD FS) requirements and considerations apply:
52
52
53
-
* The ADFS server must be enabled for certificate authentication and use federated authentication.
53
+
* The AD FS server must be enabled for certificate authentication and use federated authentication.
54
54
* The certificate needs to have to use Enhanced Key Usage (EKU) and contain the UPN of the user in the *Subject Alternative Name (NT Principal Name)*.
55
55
56
-
## Configure ADFS
56
+
## Configure AD FS
57
57
58
-
For Azure AD to revoke a client certificate, the ADFS token must have the following claims. Azure AD adds these claims to the refresh token if they're available in the ADFS token (or any other SAML token). When the refresh token needs to be validated, this information is used to check the revocation:
58
+
For Azure AD to revoke a client certificate, the AD FS token must have the following claims. Azure AD adds these claims to the refresh token if they're available in the AD FS token (or any other SAML token). When the refresh token needs to be validated, this information is used to check the revocation:
59
59
60
60
*`http://schemas.microsoft.com/ws/2008/06/identity/claims/<serialnumber>` - add the serial number of your client certificate
61
61
*`http://schemas.microsoft.com/2012/12/certificatecontext/field/<issuer>` - add the string for the issuer of your client certificate
62
62
63
-
As a best practice, you also should update your organization's ADFS error pages with the following information:
63
+
As a best practice, you also should update your organization's AD FS error pages with the following information:
64
64
65
65
* The requirement for installing the Microsoft Authenticator on iOS.
66
66
* Instructions on how to get a user certificate.
@@ -69,7 +69,7 @@ For more information, see [Customizing the AD FS sign in page](/previous-version
69
69
70
70
## Use modern authentication with Office apps
71
71
72
-
Some Office apps with modern authentication enabled send `prompt=login` to Azure AD in their request. By default, Azure AD translates `prompt=login` in the request to ADFS as `wauth=usernamepassworduri` (asks ADFS to do U/P Auth) and `wfresh=0` (asks ADFS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, modify the default Azure AD behavior.
72
+
Some Office apps with modern authentication enabled send `prompt=login` to Azure AD in their request. By default, Azure AD translates `prompt=login` in the request to AD FS as `wauth=usernamepassworduri` (asks AD FS to do U/P Auth) and `wfresh=0` (asks AD FS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, modify the default Azure AD behavior.
73
73
74
74
To update the default behavior, set the '*PromptLoginBehavior*' in your federated domain settings to *Disabled*. You can use the [MSOLDomainFederationSettings](/powershell/module/msonline/set-msoldomainfederationsettings) cmdlet to perform this task, as shown in the following example:
0 commit comments