Skip to content

Commit 92181d2

Browse files
authored
Merge pull request #236832 from MicrosoftDocs/main
5/03 PM Publish
2 parents aaff63c + 746499f commit 92181d2

File tree

113 files changed

+1281
-730
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

113 files changed

+1281
-730
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5753,6 +5753,11 @@
57535753
"redirect_url": "/azure/app-service-mobile",
57545754
"redirect_document_id": false
57555755
},
5756+
{
5757+
"source_path_from_root": "/articles/quotas/classic-deployment-model-quota-increase-requests.md",
5758+
"redirect_url": "/azure/quotas",
5759+
"redirect_document_id": false
5760+
},
57565761
{
57575762
"source_path_from_root": "/articles/app-service-mobile-net-upgrading-from-mobile-services.md",
57585763
"redirect_url": "/azure/app-service-mobile",

articles/active-directory/authentication/concept-authentication-strengths.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -203,8 +203,6 @@ An authentication strength Conditional Access policy works together with [MFA tr
203203

204204
- **Using 'Require one of the selected controls' with 'require authentication strength' control** - After you select authentication strengths grant control and additional controls, all the selected controls must be satisfied in order to gain access to the resource. Using **Require one of the selected controls** isn't applicable, and will default to requiring all the controls in the policy.
205205

206-
- **Authentication loop** - When the user is required to use Microsoft Authenticator (Phone Sign-in) but the user is not registered for this method, they will be given instructions on how to set up the Microsoft Authenticator, that does not include how to enable Passwordless sign-in. As a result, the user can get into an authentication loop. To avoid this issue, make sure the user is registered for the method before the Conditional Access policy is enforced. Phone Sign-in can be registered using the steps outlined here: [Add your work or school account to the Microsoft Authenticator app ("Sign in with your credentials")](https://support.microsoft.com/en-us/account-billing/add-your-work-or-school-account-to-the-microsoft-authenticator-app-43a73ab5-b4e8-446d-9e54-2a4cb8e4e93c)
207-
208206

209207
## Limitations
210208

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 03/06/2023
9+
ms.date: 05/03/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Combined security information registration for Azure Active Directory overview
1919

20-
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for multifactor authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both multifactor authentication and SSPR. We recommend this video on [How to enable and configure SSPR in Azure AD](https://www.youtube.com/watch?v=rA8TvhNcCvQ)
20+
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for multifactor authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both multifactor authentication and SSPR. We recommend this video on [How to enable and configure SSPR in Azure AD](https://www.youtube.com/watch?v=rA8TvhNcCvQ).
2121

2222

2323
![My Account showing registered Security info for a user](media/concept-registration-mfa-sspr-combined/combined-security-info-defaults-registered.png)
@@ -50,11 +50,15 @@ Combined registration supports the authentication methods and actions in the fol
5050
| FIDO2 security keys*| Yes | No | Yes |
5151

5252
> [!NOTE]
53-
> <b>Microsoft Authenticator</b> if the authentication mode set in policy for Microsoft Authenticator is passwordless, users will need to enable passwordless sign-in from within the Microsoft Authenticator app. Learn more on [user regsitration of passwordless phone sign-in here.](../authentication/howto-authentication-passwordless-phone.md#user-registration). <br />
54-
> <b>Alternate phone</b> can only be registered in *manage mode* on the [Security info](https://mysignins.microsoft.com/security-info) page and requires Voice calls to be enabled in the Authentication methods policy. <br />
55-
> <b>Office phone</b> can only be registered in *Interrupt mode* if the users *Business phone* property has been set. Office phone can be added by users in *Managed mode from the [Security info](https://mysignins.microsoft.com/security-info)* without this requirement. <br />
56-
> <b>App passwords</b> are available only to users who have been enforced for per-user MFA. App passwords aren't available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy. <br />
57-
> <b>FIDO2 security keys</b>, can only be added in *manage mode only* on the [Security info](https://mysignins.microsoft.com/security-info) page.
53+
> If you enable Microsoft Authenticator for passwordless authentication mode in the Authentication methods policy, users need to also enable passwordless sign-in in the Authenticator app.
54+
>
55+
> Alternate phone can only be registered in *Manage mode* on [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo) and requires Voice calls to be enabled in the Authentication methods policy.
56+
>
57+
> Office phone can only be registered in *Interrupt mode* if the users *Business phone* property has been set. Office phone can be added by users in *Managed mode* from [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo) without this requirement.
58+
>
59+
> App passwords are available only to users who have been enforced for per-user MFA. App passwords aren't available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy.
60+
>
61+
> FIDO2 security keys, can only be added in *Manage mode* on [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo).
5862
5963
Users can set one of the following options as the default multifactor authentication method.
6064

articles/active-directory/authentication/howto-authentication-use-email-signin.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -125,6 +125,9 @@ One of the user attributes that's automatically synchronized by Azure AD Connect
125125

126126
Email as an alternate login ID applies to [Azure AD B2B collaboration](../external-identities/what-is-b2b.md) under a "bring your own sign-in identifiers" model. When email as an alternate login ID is enabled in the home tenant, Azure AD users can perform guest sign in with non-UPN email on the resource tenant endpoint. No action is required from the resource tenant to enable this functionality.
127127

128+
> [!NOTE]
129+
> When an alternate login ID is used on a resource tenant endpoint that does not have the functionality enabled, the sign-in process will work seamlessly, but SSO will be interrupted.
130+
128131
## Enable user sign-in with an email address
129132

130133
> [!NOTE]

articles/active-directory/authentication/howto-password-ban-bad-on-premises-deploy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -249,7 +249,7 @@ To install the Azure AD Password Protection proxy service, complete the followin
249249

250250
Registration of the Azure AD Password Protection proxy service is necessary only once in the lifetime of the service. After that, the Azure AD Password Protection proxy service will automatically perform any other necessary maintenance.
251251

252-
1. To make sure that the changes have taken effect, run `Test-AzureADPasswordProtectionDCAgentHealth -TestAll`. For help resolving errors, see [Troubleshoot: On-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-troubleshoot.md).
252+
1. To make sure that the changes have taken effect, run `Test-AzureADPasswordProtectionProxyHealth -TestAll`. For help resolving errors, see [Troubleshoot: On-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-troubleshoot.md).
253253

254254
1. Now register the on-premises Active Directory forest with the necessary credentials to communicate with Azure by using the `Register-AzureADPasswordProtectionForest` PowerShell cmdlet.
255255

@@ -304,7 +304,7 @@ To install the Azure AD Password Protection proxy service, complete the followin
304304
305305
For `Register-AzureADPasswordProtectionForest` to succeed, at least one DC running Windows Server 2012 or later must be available in the Azure AD Password Protection proxy server's domain. The Azure AD Password Protection DC agent software doesn't have to be installed on any domain controllers prior to this step.
306306

307-
1. To make sure that the changes have taken effect, run `Test-AzureADPasswordProtectionDCAgentHealth -TestAll`. For help resolving errors, see [Troubleshoot: On-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-troubleshoot.md).
307+
1. To make sure that the changes have taken effect, run `Test-AzureADPasswordProtectionProxyHealth -TestAll`. For help resolving errors, see [Troubleshoot: On-premises Azure AD Password Protection](howto-password-ban-bad-on-premises-troubleshoot.md).
308308

309309
### Configure the proxy service to communicate through an HTTP proxy
310310

articles/active-directory/develop/spa-quickstart-portal-angular-ciam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.date: 05/05/2023
2020
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
2121
> 1. Make sure you've installed [Node.js](https://nodejs.org/en/download/).
2222
>
23-
> 1. Unzip the sample, `cd` into the folder that contains `package.json`, then run the following commands:
23+
> 1. Unzip the sample app, `cd` into the folder that contains `package.json`, then run the following commands:
2424
> ```console
2525
> npm install && npm start
2626
> ```

articles/active-directory/develop/spa-quickstart-portal-react-ciam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.date: 05/05/2023
2020
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
2121
> 1. Make sure you've installed [Node.js](https://nodejs.org/en/download/).
2222
>
23-
> 1. Unzip the sample, `cd` into the folder that contains `package.json`, then run the following commands:
23+
> 1. Unzip the sample app, `cd` into the folder that contains `package.json`, then run the following commands:
2424
> ```console
2525
> npm install && npm start
2626
> ```

articles/active-directory/develop/spa-quickstart-portal-vanilla-js-ciam.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,9 @@ ms.date: 05/05/2023
2020
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
2121
> 1. Make sure you've installed [Node.js](https://nodejs.org/en/download/).
2222
>
23-
> 1. Unzip the sample, `cd` into the app root folder, then run the following commands:
23+
> 1. Unzip the sample app, `cd` into the app root folder, then run the following command:
2424
> ```console
25-
> cd App && npm install && npm start
25+
> npm install && npm start
2626
> ```
2727
> 1. Open your browser, visit `http://locahost:3000`, select **Sign-in**, then follow the prompts.
2828
>

articles/active-directory/develop/web-app-quickstart-portal-dotnet-ciam.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ ms.date: 05/05/2023
1818
> In this quickstart, you download and run a code sample that demonstrates how ASP.NET web app can sign in users with Azure Active Directory for customers.
1919
>
2020
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
21-
> 1. Make sure you've installed Make sure you've installed [.NET SDK v7](https://dotnet.microsoft.com/download/dotnet/7.0) or later.
21+
> 1. Make sure you've installed [.NET SDK v7](https://dotnet.microsoft.com/download/dotnet/7.0) or later.
2222
>
23-
> 1. Unzip the sample, `cd` into the app root folder, then run the following command:
23+
> 1. Unzip the sample app, `cd` into the app root folder, then run the following command:
2424
> ```console
2525
> dotnet run
2626
> ```

articles/active-directory/develop/web-app-quickstart-portal-node-js-ciam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.date: 05/05/2023
2020
> [!div renderon="portal" id="display-on-portal" class="sxs-lookup"]
2121
> 1. Make sure you've installed [Node.js](https://nodejs.org/en/download/).
2222
>
23-
> 1. Unzip the sample, `cd` into the folder that contains `package.json`, then run the following commands:
23+
> 1. Unzip the sample app, `cd` into the folder that contains `package.json`, then run the following command:
2424
> ```console
2525
> npm install && npm start
2626
> ```

0 commit comments

Comments
 (0)