Skip to content

Commit 934776a

Browse files
authored
Merge pull request #105006 from MicrosoftDocs/master
2/20 AM Publish
2 parents 0a9419a + 973a8e8 commit 934776a

File tree

51 files changed

+1806
-1070
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+1806
-1070
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -37215,11 +37215,6 @@
3721537215
"redirect_url": "/azure/active-directory/user-help/myprofile-portal-overview",
3721637216
"redirect_document_id": false
3721737217
},
37218-
{
37219-
"source_path": "articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md",
37220-
"redirect_url": "/azure/active-directory/authentication/howto-authentication-passwordless-security-key-windows",
37221-
"redirect_document_id": false
37222-
},
3722337218
{
3722437219
"source_path": "articles/active-directory/authentication/quickstart-sspr.md",
3722537220
"redirect_url": "/azure/active-directory/authentication/tutorial-enable-sspr",

articles/active-directory-b2c/string-transformations.md

Lines changed: 39 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/05/2020
12+
ms.date: 02/20/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
---
@@ -30,7 +30,8 @@ Compare two claims, and throw an exception if they are not equal according to th
3030
| InputClaim | inputClaim2 | string | Second claim's type, which is to be compared. |
3131
| InputParameter | stringComparison | string | string comparison, one of the values: Ordinal, OrdinalIgnoreCase. |
3232

33-
The **AssertStringClaimsAreEqual** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md). The **UserMessageIfClaimsTransformationStringsAreNotEqual** self-asserted technical profile metadata controls the error message that is presented to the user.
33+
The **AssertStringClaimsAreEqual** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md), or a [DisplayConrtol](display-controls.md). The `UserMessageIfClaimsTransformationStringsAreNotEqual` metadata of a self-asserted technical profile controls the error message that is presented to the user.
34+
3435

3536
![AssertStringClaimsAreEqual execution](./media/string-transformations/assert-execution.png)
3637

@@ -513,6 +514,42 @@ The following example looks up the domain name in one of the inputParameters col
513514
- Output claims:
514515
- **outputClaim**: c7026f88-4299-4cdb-965d-3f166464b8a9
515516

517+
When `errorOnFailedLookup` input parameter is set to `true`, the **LookupValue** claims transformation is always executed from a [validation technical profile](validation-technical-profile.md) that is called by a [self-asserted technical profile](self-asserted-technical-profile.md), or a [DisplayConrtol](display-controls.md). The `LookupNotFound` metadata of a self-asserted technical profile controls the error message that is presented to the user.
518+
519+
![AssertStringClaimsAreEqual execution](./media/string-transformations/assert-execution.png)
520+
521+
The following example looks up the domain name in one of the inputParameters collections. The claims transformation looks up the domain name in the identifier and returns its value (an application ID), or raises an error message.
522+
523+
```XML
524+
<ClaimsTransformation Id="DomainToClientId" TransformationMethod="LookupValue">
525+
<InputClaims>
526+
<InputClaim ClaimTypeReferenceId="domainName" TransformationClaimType="inputParameterId" />
527+
</InputClaims>
528+
<InputParameters>
529+
<InputParameter Id="contoso.com" DataType="string" Value="13c15f79-8fb1-4e29-a6c9-be0d36ff19f1" />
530+
<InputParameter Id="microsoft.com" DataType="string" Value="0213308f-17cb-4398-b97e-01da7bd4804e" />
531+
<InputParameter Id="test.com" DataType="string" Value="c7026f88-4299-4cdb-965d-3f166464b8a9" />
532+
<InputParameter Id="errorOnFailedLookup" DataType="boolean" Value="true" />
533+
</InputParameters>
534+
<OutputClaims>
535+
<OutputClaim ClaimTypeReferenceId="domainAppId" TransformationClaimType="outputClaim" />
536+
</OutputClaims>
537+
</ClaimsTransformation>
538+
```
539+
540+
### Example
541+
542+
- Input claims:
543+
- **inputParameterId**: live.com
544+
- Input parameters:
545+
- **contoso.com**: 13c15f79-8fb1-4e29-a6c9-be0d36ff19f1
546+
- **microsoft.com**: 0213308f-17cb-4398-b97e-01da7bd4804e
547+
- **test.com**: c7026f88-4299-4cdb-965d-3f166464b8a9
548+
- **errorOnFailedLookup**: true
549+
- Error:
550+
- No match found for the input claim value in the list of input parameter ids and errorOnFailedLookup is true.
551+
552+
516553
## NullClaim
517554

518555
Clean the value of a given claim.

articles/active-directory-b2c/technical-profiles-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ A technical profile enables these types of scenarios:
3535
- [SAML2](saml-technical-profile.md) - Federation with any SAML protocol identity provider.
3636
- [Self-Asserted](self-asserted-technical-profile.md) - Interact with the user. For example, collect the user's credential to sign in, render the sign-up page, or password reset.
3737
- [Session management](custom-policy-reference-sso.md) - Handle different types of sessions.
38-
- **Application Insights**
38+
- [Application Insights](../azure-monitor/app/usage-overview.md)
3939
- [One time password](one-time-password-technical-profile.md) - Provides support for managing the generation and verification of a one-time password.
4040

4141
## Technical profile flow

articles/active-directory-b2c/view-audit-logs.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 02/12/2020
12+
ms.date: 02/20/2020
1313
ms.author: marsma
1414
ms.subservice: B2C
1515
ms.custom: fasttrack-edit
@@ -109,13 +109,14 @@ The following PowerShell script shows an example of how to query the Azure AD re
109109
You can try this script in the [Azure Cloud Shell](overview.md). Be sure to update it with your application ID, client secret, and the name of your Azure AD B2C tenant.
110110

111111
```powershell
112-
# This script requires the registration of a Web Application in Azure Active Directory:
113-
# https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-reporting-api
112+
# This script requires an application registration that's granted Microsoft Graph API permission
113+
# https://docs.microsoft.com/azure/active-directory-b2c/microsoft-graph-get-started
114114
115115
# Constants
116-
$ClientID = "your-client-application-id-here" # Insert your application's client ID, a GUID (registered by Global Admin)
116+
$ClientID = "your-client-application-id-here" # Insert your application's client ID, a GUID
117117
$ClientSecret = "your-client-application-secret-here" # Insert your application's client secret
118-
$tenantdomain = "your-b2c-tenant.onmicrosoft.com" # Insert your Azure AD B2C tenant; for example, contoso.onmicrosoft.com
118+
$tenantdomain = "your-b2c-tenant.onmicrosoft.com" # Insert your Azure AD B2C tenant domain name
119+
119120
$loginURL = "https://login.microsoftonline.com"
120121
$resource = "https://graph.microsoft.com" # Microsoft Graph API resource URI
121122
$7daysago = "{0:s}" -f (get-date).AddDays(-7) + "Z" # Use 'AddMinutes(-5)' to decrement minutes, for example

articles/active-directory/authentication/TOC.yml

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -130,10 +130,14 @@
130130
items:
131131
- name: Deploying passwordless
132132
href: howto-authentication-passwordless-deployment.md
133-
- name: Passwordless security keys
134-
href: howto-authentication-passwordless-security-key.md
135-
- name: Passwordless Windows 10
136-
href: howto-authentication-passwordless-security-key-windows.md
133+
- name: Passwordless FIDO2 security keys
134+
items:
135+
- name: Enable FIDO2 security keys for your tenant
136+
href: howto-authentication-passwordless-security-key.md
137+
- name: Sign in to Windows 10 devices
138+
href: howto-authentication-passwordless-security-key-windows.md
139+
- name: SSO to on-premises resources
140+
href: howto-authentication-passwordless-security-key-on-premises.md
137141
- name: Passwordless phone sign-in
138142
href: howto-authentication-passwordless-phone.md
139143
- name: Windows Hello for Business

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Azure Active Directory passwordless sign in (preview)
3-
description: Learn about options for passwordless sign in to Azure Active Directory using FIDO2 security keys or the Microsoft Authenticator app
2+
title: Azure Active Directory passwordless sign-in (preview)
3+
description: Learn about options for passwordless sign-in to Azure Active Directory using FIDO2 security keys or the Microsoft Authenticator app
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/24/2020
9+
ms.date: 01/30/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -15,15 +15,15 @@ ms.reviewer: librown
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Passwordless authentication options
18+
# Passwordless authentication options for Azure Active Directory
1919

2020
Multi-factor authentication (MFA) is a great way to secure your organization, but users often get frustrated with the additional security layer on top of having to remember their passwords. Passwordless authentication methods are more convenient because the password is removed and replaced with something you have, plus something you are or something you know.
2121

2222
| | Something you have | Something you are or know |
2323
| --- | --- | --- |
2424
| Passwordless | Windows 10 Device, phone, or security key | Biometric or PIN |
2525

26-
Each organization has different needs when it comes to authentication. Microsoft offers three passwordless authentication options:
26+
Each organization has different needs when it comes to authentication. Microsoft offers the following three passwordless authentication options:
2727

2828
- Windows Hello for Business
2929
- Microsoft Authenticator app
@@ -33,7 +33,7 @@ Each organization has different needs when it comes to authentication. Microsoft
3333

3434
## Windows Hello for Business
3535

36-
Windows Hello for Business is ideal for information workers who have their own designated Windows PC. The biometric and PIN are directly tied to the user's PC, which prevents access from anyone other than the owner. With public key infrastructure (PKI) integration and built-in support for single sign-on (SSO), Windows Hello for Business provides a convenient method for seamlessly accessing corporate resources on-premises and in the cloud.
36+
Windows Hello for Business is ideal for information workers who have their own designated Windows PC. The biometric and PIN is directly tied to the user's PC, which prevents access from anyone other than the owner. With public key infrastructure (PKI) integration and built-in support for single sign-on (SSO), Windows Hello for Business provides a convenient method for seamlessly accessing corporate resources on-premises and in the cloud.
3737

3838
The Windows Hello for Business [planning guide](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-planning-guide) can be used to help you make decisions on the type of Windows Hello for Business deployment and the options you'll need to consider.
3939

@@ -49,7 +49,7 @@ The Authenticator App turns any iOS or Android phone into a strong, passwordless
4949

5050
FIDO2 security keys are an unphishable standards-based passwordless authentication method that can come in any form factor. Fast Identity Online (FIDO) is an open standard for passwordless authentication. FIDO allows users and organizations to leverage the standard to sign in to their resources without a username or password using an external security key or a platform key built into a device.
5151

52-
For public preview, employees can use security keys to sign in to their Azure AD-joined Windows 10 devices and get single-sign on to their cloud and on-premises resources. Users can also sign in to supported browsers. FIDO2 security keys are a great option for enterprises who are very security sensitive or have scenarios or employees who aren't willing or able to use their phone as a second factor.
52+
For public preview, employees can use security keys to sign in to their Azure AD or hybrid Azure AD joined Windows 10 devices and get single-sign on to their cloud and on-premises resources. Users can also sign in to supported browsers. FIDO2 security keys are a great option for enterprises who are very security sensitive or have scenarios or employees who aren't willing or able to use their phone as a second factor.
5353

5454
![Sign in to Microsoft Edge with a security key](./media/concept-authentication-passwordless/concept-web-sign-in-security-key.png)
5555

0 commit comments

Comments
 (0)