Skip to content

Commit 8fdfbc6

Browse files
Merge branch 'MicrosoftDocs:main' into master
2 parents 85e2d61 + 3137656 commit 8fdfbc6

File tree

139 files changed

+1882
-1464
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

139 files changed

+1882
-1464
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,20 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/visual-studio/vs-storage-cloud-services-getting-started-blobs.md",
5+
"redirect_url": "/previous-versions/azure/visual-studio/vs-storage-cloud-services-getting-started-blobs",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "articles/visual-studio/vs-storage-cloud-services-getting-started-queues.md",
10+
"redirect_url": "/previous-versions/azure/visual-studio/vs-storage-cloud-services-getting-started-queues",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "articles/visual-studio/vs-storage-cloud-services-getting-started-tables.md",
15+
"redirect_url": "/previous-versions/azure/visual-studio/vs-storage-cloud-services-getting-started-tables",
16+
"redirect_document_id": false
17+
},
318
{
419
"source_path": "articles/automanage/automanage-virtual-machines.md",
520
"redirect_url": "/azure/automanage/index",

articles/active-directory/authentication/concept-fido2-hardware-vendor.md

Lines changed: 37 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -15,47 +15,61 @@ ms.collection: M365-identity-device-management
1515

1616
Most hacking related breaches use either stolen or weak passwords. Often, IT will enforce stronger password complexity or frequent password changes to reduce the risk of a security incident. However, this increases help desk costs and leads to poor user experiences as users are required to memorize or store new, complex passwords.
1717

18-
FIDO2 security keys offer an alternative. FIDO2 security keys can replace weak credentials with strong hardware-backed public/private-key credentials which cannot be reused, replayed, or shared across services. Security keys support shared device scenarios, allowing you to carry your credential with you and safely authenticate to an Azure Active Directory joined Windows 10 device that’s part of your organization.
18+
FIDO2 security keys offer an alternative. FIDO2 security keys can replace weak credentials with strong hardware-backed public/private-key credentials which can't be reused, replayed, or shared across services. Security keys support shared device scenarios, allowing you to carry your credential with you and safely authenticate to an Azure Active Directory joined Windows 10 device that’s part of your organization.
1919

2020
Microsoft partners with FIDO2 security key vendors to ensure that security devices work on Windows, the Microsoft Edge browser, and online Microsoft accounts, to enable strong password-less authentication.
2121

2222
You can become a Microsoft-compatible FIDO2 security key vendor through the following process. Microsoft doesn't commit to do go-to-market activities with the partner and will evaluate partner priority based on customer demand.
2323

24-
1. First, your authenticator needs to have a FIDO2 certification. We will not be able to work with providers who do not have a FIDO2 certification. To learn more about the certification, please visit this website: [https://fidoalliance.org/certification/](https://fidoalliance.org/certification/)
24+
1. First, your authenticator needs to have a FIDO2 certification. We won't be able to work with providers who don't have a FIDO2 certification. To learn more about the certification, please visit this website: [https://fidoalliance.org/certification/](https://fidoalliance.org/certification/)
2525
2. After you have a FIDO2 certification, please fill in your request to our form here: [https://forms.office.com/r/NfmQpuS9hF](https://forms.office.com/r/NfmQpuS9hF). Our engineering team will only test compatibility of your FIDO2 devices. We won't test security of your solutions.
2626
3. Once we confirm a move forward to the testing phase, the process usually take about 3-6 months. The steps usually involve:
2727
- Initial discussion between Microsoft and your team.
2828
- Verify FIDO Alliance Certification or the path to certification if not complete
2929
- Receive an overview of the device from the vendor
3030
- Microsoft will share our test scripts with you. Our engineering team will be able to answer questions if you have any specific needs.
31-
- You will complete and send all passed results to Microsoft Engineering team
31+
- You'll complete and send all passed results to Microsoft Engineering team
3232
4. Upon successful passing of all tests by Microsoft Engineering team, Microsoft will confirm vendor's device is listed in [the FIDO MDS](https://fidoalliance.org/metadata/).
3333
5. Microsoft will add your FIDO2 Security Key on Azure AD backend and to our list of approved FIDO2 vendors.
3434

3535
## Current partners
3636

3737
The following table lists partners who are Microsoft-compatible FIDO2 security key vendors.
3838

39-
| **Provider** | **Link** |
40-
| --- | --- |
41-
| AuthenTrend | [https://authentrend.com/about-us/#pg-35-3](https://authentrend.com/about-us/#pg-35-3) |
42-
| Ensurity | [https://www.ensurity.com/contact](https://www.ensurity.com/contact) |
43-
| Excelsecu | [https://www.excelsecu.com/productdetail/esecufido2secu.html](https://www.excelsecu.com/productdetail/esecufido2secu.html) |
44-
| Feitian | [https://ftsafe.us/pages/microsoft](https://ftsafe.us/pages/microsoft) |
45-
| Go-Trust ID | [https://www.gotrustid.com/](https://www.gotrustid.com/idem-key) |
46-
| HID | [https://www.hidglobal.com/contact-us](https://www.hidglobal.com/contact-us) |
47-
| Hypersecu | [https://www.hypersecu.com/hyperfido](https://www.hypersecu.com/hyperfido) |
48-
| IDmelon Technologies Inc. | [https://www.idmelon.com/#idmelon](https://www.idmelon.com/#idmelon) |
49-
| Kensington | [https://www.kensington.com/solutions/product-category/why-biometrics/](https://www.kensington.com/solutions/product-category/why-biometrics/) |
50-
| KONA I | [https://konai.com/business/security/fido](https://konai.com/business/security/fido) |
51-
| Nymi | [https://www.nymi.com/product](https://www.nymi.com/product) |
52-
| OneSpan Inc. | [https://www.onespan.com/products/fido](https://www.onespan.com/products/fido) |
53-
| Thales | [https://cpl.thalesgroup.com/access-management/authenticators/fido-devices](https://cpl.thalesgroup.com/access-management/authenticators/fido-devices) |
54-
| Thetis | [https://thetis.io/collections/fido2](https://thetis.io/collections/fido2) |
55-
| Token2 Switzerland | [https://www.token2.swiss/shop/product/token2-t2f2-alu-fido2-u2f-and-totp-security-key](https://www.token2.swiss/shop/product/token2-t2f2-alu-fido2-u2f-and-totp-security-key) |
56-
| TrustKey Solutions | [https://www.trustkeysolutions.com/security-keys/](https://www.trustkeysolutions.com/security-keys/) |
57-
| VinCSS | [https://passwordless.vincss.net](https://passwordless.vincss.net/) |
58-
| Yubico | [https://www.yubico.com/solutions/passwordless/](https://www.yubico.com/solutions/passwordless/) |
39+
| Provider | Biometric | USB | NFC | BLE | FIPS Certified | Contact |
40+
|---------------------------|:-----------------:|:---:|:---:|:---:|:--------------:|-----------------------------------------------------------------------------------------------------|
41+
| AuthenTrend | ![y] | ![y]| ![y]| ![y]| ![n] | https://authentrend.com/about-us/#pg-35-3 |
42+
| Ciright | ![n] | ![n]| ![y]| ![n]| ![n] | https://www.cyberonecard.com/ |
43+
| Crayonic | ![y] | ![n]| ![y]| ![y]| ![n] | https://www.crayonic.com/keyvault |
44+
| Ensurity | ![y] | ![y]| ![n]| ![n]| ![n] | https://www.ensurity.com/contact |
45+
| Excelsecu | ![y] | ![y]| ![y]| ![y]| ![n] | https://www.excelsecu.com/productdetail/esecufido2secu.html |
46+
| Feitian | ![y] | ![y]| ![y]| ![y]| ![y] | https://shop.ftsafe.us/pages/microsoft |
47+
| Fortinet | ![n] | ![y]| ![n]| ![n]| ![n] | https://www.fortinet.com/ |
48+
| Giesecke + Devrient (G+D) | ![y] | ![y]| ![y]| ![y]| ![n] | https://www.gi-de.com/en/identities/enterprise-security/hardware-based-authentication |
49+
| GoTrustID Inc. | ![n] | ![y]| ![y]| ![y]| ![n] | https://www.gotrustid.com/idem-key |
50+
| HID | ![n] | ![y]| ![y]| ![n]| ![n] | https://www.hidglobal.com/contact-us |
51+
| Hypersecu | ![n] | ![y]| ![n]| ![n]| ![n] | https://www.hypersecu.com/hyperfido |
52+
| IDmelon Technologies Inc. | ![y] | ![y]| ![y]| ![y]| ![n] | https://www.idmelon.com/#idmelon |
53+
| Kensington | ![y] | ![y]| ![n]| ![n]| ![n] | https://www.kensington.com/solutions/product-category/why-biometrics/ |
54+
| KONA I | ![y] | ![n]| ![y]| ![y]| ![n] | https://konai.com/business/security/fido |
55+
| NeoWave | ![n] | ![y]| ![y]| ![n]| ![n] | https://neowave.fr/en/products/fido-range/ |
56+
| Nymi | ![y] | ![n]| ![y]| ![n]| ![n] | https://www.nymi.com/nymi-band |
57+
| Octatco | ![y] | ![y]| ![n]| ![n]| ![n] | https://octatco.com/ |
58+
| OneSpan Inc. | ![n] | ![y]| ![n]| ![y]| ![n] | https://www.onespan.com/products/fido |
59+
| Swissbit | ![n] | ![y]| ![y]| ![n]| ![n] | https://www.swissbit.com/en/products/ishield-fido2/ |
60+
| Thales Group | ![n] | ![y]| ![y]| ![n]| ![y] | https://cpl.thalesgroup.com/access-management/authenticators/fido-devices |
61+
| Thetis | ![y] | ![y]| ![y]| ![y]| ![n] | https://thetis.io/collections/fido2 |
62+
| Token2 Switzerland | ![y] | ![y]| ![y]| ![n]| ![n] | https://www.token2.swiss/shop/product/token2-t2f2-alu-fido2-u2f-and-totp-security-key |
63+
| TrustKey Solutions | ![y] | ![y]| ![n]| ![n]| ![n] | https://www.trustkeysolutions.com/security-keys/ |
64+
| VinCSS | ![n] | ![y]| ![n]| ![n]| ![n] | https://passwordless.vincss.net |
65+
| Yubico | ![y] | ![y]| ![y]| ![n]| ![y] | https://www.yubico.com/solutions/passwordless/ |
66+
67+
68+
69+
<!--Image references-->
70+
[y]: ./media/fido2-compatibility/yes.png
71+
[n]: ./media/fido2-compatibility/no.png
72+
5973

6074
## Next steps
6175

articles/active-directory/fundamentals/users-default-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Users and contacts | <ul><li>Enumerate the list of all users and contacts<li>Rea
3737
Groups | <ul><li>Create security groups<li>Create Microsoft 365 groups<li>Enumerate the list of all groups<li>Read all properties of groups<li>Read non-hidden group memberships<li>Read hidden Microsoft 365 group memberships for joined groups<li>Manage properties, ownership, and membership of groups that the user owns<li>Add guests to owned groups<li>Manage dynamic membership settings<li>Delete owned groups<li>Restore owned Microsoft 365 groups</li></ul> | <ul><li>Read properties of non-hidden groups, including membership and ownership (even non-joined groups)<li>Read hidden Microsoft 365 group memberships for joined groups<li>Search for groups by display name or object ID (if allowed)</li></ul> | <ul><li>Read object ID for joined groups<li>Read membership and ownership of joined groups in some Microsoft 365 apps (if allowed)</li></ul>
3838
Applications | <ul><li>Register (create) new applications<li>Enumerate the list of all applications<li>Read properties of registered and enterprise applications<li>Manage application properties, assignments, and credentials for owned applications<li>Create or delete application passwords for users<li>Delete owned applications<li>Restore owned applications</li></ul> | <ul><li>Read properties of registered and enterprise applications</li></ul> | <ul><li>Read properties of registered and enterprise applications
3939
Devices</li></ul> | <ul><li>Enumerate the list of all devices<li>Read all properties of devices<li>Manage all properties of owned devices</li></ul> | No permissions | No permissions
40-
Directory | <ul><li>Read all company information<li>Read all domains<li>Read all partner contracts</li></ul> | <ul><li>Read company display name<li>Read all domains</li></ul> | <ul><li>Read company display name<li>Read all domains</li></ul>
40+
Organization | <ul><li>Read all company information<li>Read all domains<li>Read configuration of certificate-based authentication<li>Read all partner contracts</li></ul> | <ul><li>Read company display name<li>Read all domains<li>Read configuration of certificate-based authentication</li></ul> | <ul><li>Read company display name<li>Read all domains</li></ul>
4141
Roles and scopes | <ul><li>Read all administrative roles and memberships<li>Read all properties and membership of administrative units</li></ul> | No permissions | No permissions
4242
Subscriptions | <ul><li>Read all subscriptions<li>Enable service plan memberships</li></ul> | No permissions | No permissions
4343
Policies | <ul><li>Read all properties of policies<li>Manage all properties of owned policies</li></ul> | No permissions | No permissions
75.6 KB
Loading

articles/active-directory/saas-apps/mural-identity-tutorial.md

Lines changed: 35 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 12/10/2021
12+
ms.date: 09/19/2022
1313
ms.author: jeedes
1414

1515
---
@@ -86,10 +86,12 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8686
| Name | Source Attribute|
8787
| -------- | --------- |
8888
| email | user.userprincipalname |
89+
| FirstName | user.givenname |
90+
| LastName | user.surname |
8991

90-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
92+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (PEM)** and select **Download** to download the certificate and save it on your computer.
9193

92-
![The Certificate download link](common/certificatebase64.png)
94+
![The Certificate download link](common/certificate-base64-download.png)
9395

9496
1. On the **Set up MURAL Identity** section, copy the appropriate URL(s) based on your requirement.
9597

@@ -121,7 +123,34 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
121123

122124
## Configure MURAL Identity SSO
123125

124-
To configure single sign-on on **MURAL Identity** side, you need to send the downloaded **Certificate (Base64)** and appropriate copied URLs from Azure portal to [MURAL Identity support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
126+
1. Log in to the MURAL Identity website as an administrator.
127+
128+
1. Click your **name** in the bottom left corner of the dashboard and select **Company dashboard** from the list of options.
129+
130+
1. Click **SSO** in the left sidebar and perform the below steps.
131+
132+
![Screenshot of showing the configuration for MURAL.](./media/mural-identity-tutorial/settings.png)
133+
134+
a. Download the **MURAL's metadata**.
135+
136+
b. In the **Sign in URL** textbox, paste the **Login URL** value, which you have copied from the Azure portal.
137+
138+
c. In the **Sign in certificate**, upload the **Certificate (PEM)**, which you have downloaded from the Azure portal.
139+
140+
d. Select **HTTP-POST** as the Request binding type and select **SHA256** as the Sign in algorithm type.
141+
142+
e. In the **Claim mapping** section, fill the following fields.
143+
144+
* Email address: `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress`
145+
146+
* First name: `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname`
147+
148+
* Last name: `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname`
149+
150+
f. Click **Test single sign-on** to test the configuration and **Save** it.
151+
152+
> [!NOTE]
153+
> For more information on how to configure the SSO at MURAL, please follow [this](https://support.mural.co/articles/6224385-mural-s-azure-ad-integration) support page.
125154
126155
### Create MURAL Identity test user
127156

@@ -135,13 +164,13 @@ In this section, you test your Azure AD single sign-on configuration with follow
135164

136165
* Click on **Test this application** in Azure portal. This will redirect to MURAL Identity Sign on URL where you can initiate the login flow.
137166

138-
* Go to MURAL Identity Sign-on URL directly and initiate the login flow from there.
167+
* Go to MURAL Identity Sign on URL directly and initiate the login flow from there.
139168

140169
#### IDP initiated:
141170

142171
* Click on **Test this application** in Azure portal and you should be automatically signed in to the MURAL Identity for which you set up the SSO.
143172

144-
You can also use Microsoft My Apps to test the application in any mode. When you click the MURAL Identity tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the MURAL Identity for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
173+
You can also use Microsoft My Apps to test the application in any mode. When you click the MURAL Identity tile in the My Apps, if configured in SP mode you would be redirected to the application sign-on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the MURAL Identity for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
145174

146175
## Change log
147176

articles/aks/faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -303,7 +303,7 @@ AKS doesn't apply Network Security Groups (NSGs) to its subnet and doesn't modif
303303
304304
## How does Time syncronization work in AKS?
305305
306-
AKS nodes run the "chrony" service which pulls time from the localhost, which in turn sync time with ntp.ubuntu.com. Containers running on pods get the time from the AKS nodes. Applications launched inside a container use time from the container of the pod.
306+
AKS nodes run the "chrony" service which pulls time from the localhost. Containers running on pods get the time from the AKS nodes. Applications launched inside a container use time from the container of the pod.
307307
308308
<!-- LINKS - internal -->
309309

0 commit comments

Comments
 (0)