Skip to content

Commit 95bbfea

Browse files
authored
Merge pull request #3068 from MicrosoftDocs/FromPrivateRepo
From private repo
2 parents 350d8ca + f8303e0 commit 95bbfea

File tree

49 files changed

+486
-513
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

49 files changed

+486
-513
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9954,6 +9954,16 @@
99549954
"redirect_url": "/azure/cosmos-db/table-storage-cloud-service-nodejs",
99559955
"redirect_document_id": true
99569956
},
9957+
{
9958+
"source_path": "articles/sql-database/sql-database-geo-replication-transact-sql.md",
9959+
"redirect_url": "/azure/sql-database/sql-database-geo-replication-overview",
9960+
"redirect_document_id": true
9961+
},
9962+
{
9963+
"source_path": "articles/sql-database/sql-database-geo-replication-failover-transact-sql.md",
9964+
"redirect_url": "/sql/t-sql/statements/alter-database-azure-sql-database",
9965+
"redirect_document_id": true
9966+
},
99579967
{
99589968
"source_path": "articles/storage/storage-performance-checklist.md",
99599969
"redirect_url": "/azure/storage/common/storage-performance-checklist",

articles/active-directory/active-directory-conditional-access-no-modern-authentication.md

Lines changed: 114 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Block access to Enterprise applications in the Azure portal that don't use modern authentication | Microsoft Docs
3-
description: Learn how to block access to Enterprise applications in the Azure portal that don't use modern authentication.
2+
title: Set up SharePoint Online and Exchange Online for Azure Active Directory conditional access | Microsoft Docs
3+
description: Learn how to set up SharePoint Online and Exchange Online for Azure Active Directory conditional access.
44
services: active-directory
55
documentationcenter: ''
66
author: MarkusVi
@@ -19,51 +19,143 @@ ms.reviewer: calebb
1919

2020
---
2121

22-
# Block access to Enterprise applications in the Azure portal that don't use modern authentication
22+
# Set up SharePoint Online and Exchange Online for Azure Active Directory conditional access
2323

24-
With [Azure Active Directory (Azure AD) conditional access](active-directory-conditional-access-azure-portal.md), you can control how authorized users can access your Enterprise applications. You can only use Azure AD conditional access for applications that use [modern authentication](https://support.office.com/article/Using-Office-365-modern-authentication-with-Office-clients-776c0036-66fd-41cb-8928-5495c0f9168a).
24+
With [Azure Active Directory (Azure AD) conditional access](active-directory-conditional-access-azure-portal.md), you can control how users access your cloud apps. If you want to use conditional access to control access to SharePoint and Exchange online, you need to:
2525

26-
This topic explains, how you can block access to applications that don't use modern authentication.
26+
- Review whether your conditional access scenario is supported
27+
- Prevent client apps from bypassing the enforcement of your conditional access policies.
2728

29+
This article explains, how you can address both cases.
2830

29-
## Control access in Office 365 SharePoint Online
3031

31-
You can disable legacy protocols for SharePoint access by using the Set-SPOTenant cmdlet. Use this cmdlet to prevent Office clients that use non-modern authentication protocols from accessing SharePoint Online resources.
32+
## What you need to know
3233

33-
**Example command**:
34-
`Set-SPOTenant -LegacyAuthProtocolsEnabled $false`
34+
You can use Azure AD conditional access to protect cloud apps when an authentication attempt comes from:
3535

36-
## Control access in Office 365 Exchange Online
36+
- A web browser
3737

38-
Exchange supports two main categories of protocols. Review the following options, and then select the policy that is right for your organization.
38+
- A client app that uses [modern authentication](https://support.office.com/article/Using-Office-365-modern-authentication-with-Office-clients-776c0036-66fd-41cb-8928-5495c0f9168a)
3939

40-
* **Exchange ActiveSync**. By default, conditional access policies for multi-factor authentication and location are not enforced for Exchange ActiveSync. You need to protect access to these services either by configuring Exchange ActiveSync policy directly, or by blocking Exchange ActiveSync by using Active Directory Federation Services (AD FS) rules.
41-
* **Legacy protocols**. You can block legacy protocols with AD FS. This blocks access to older Office clients, such as Office 2013 without modern authentication enabled, and earlier versions of Office.
40+
- Exchange ActiveSync
4241

43-
### Use AD FS to block legacy protocol
44-
You can use the following example issuance authorization rules to block legacy protocol access at the AD FS level. Choose from two common configurations.
42+
Some cloud apps also support legacy authentication protocols. This applies, for example, to SharePoint Online and Exchange Online. When a client app can use a legacy authentication protocol to access a cloud app, Azure AD cannot enforce a conditional access policy on this access attempt. To prevent a client app from bypassing the enforcement of policies, you should check whether it is possible to only enable modern authentication on the affected cloud apps.
4543

46-
#### Option 1: Allow Exchange ActiveSync, and allow legacy apps, but only on the intranet
47-
By applying the following three rules to the AD FS relying party trust for Microsoft Office 365 Identity Platform, Exchange ActiveSync traffic, and browser and modern authentication traffic, have access. Legacy apps are blocked from the extranet.
44+
Examples for client apps conditional access does not apply to are:
45+
46+
- Office 2010 and earlier
47+
48+
- Office 2013 when modern authentication is not enabled
49+
50+
51+
52+
53+
## Control access to SharePoint Online
54+
55+
In addition to modern authentication, SharePoint Online also supports legacy authentication protocols. If the legacy authentication protocols are enabled, your conditional access policies for SharePoint are not enforced for clients that don't use modern authentication.
56+
57+
You can disable legacy authentication protocols for SharePoint access by using the **[Set-SPOTenant](https://technet.microsoft.com/library/fp161390.aspx)** cmdlet:
58+
59+
Set-SPOTenant -LegacyAuthProtocolsEnabled $false
60+
61+
## Control access to Exchange Online
62+
63+
When you set up conditional access policies for Exchange Online, you need to review the following:
64+
65+
- Exchange ActiveSync
66+
67+
- Legacy authentication protocols
68+
69+
70+
71+
### Exchange ActiveSync
72+
73+
While Exchange Active Sync supports modern authentication, there are some limitations regarding the support for conditional access scenarios:
74+
75+
- You can only configure the device platforms condition
76+
77+
![Device platforms](./media/active-directory-conditional-access-no-modern-authentication/05.png)
78+
79+
- Setting the multi-factor authentication requirement is not supported
80+
81+
![Conditional access](./media/active-directory-conditional-access-no-modern-authentication/01.png)
82+
83+
To effectively protect access to Exchange Online from Exchange ActiveSync, you can:
84+
85+
- Configure a supported conditional access policy by following these steps:
86+
87+
a. Select just **Office 365 Exchange Online** as cloud app.
88+
89+
![Conditional access](./media/active-directory-conditional-access-no-modern-authentication/04.png)
90+
91+
b. Select **Exchange Active Sync** as **client app**, and then select **Apply policy only to supported platforms**.
92+
93+
![Device platforms](./media/active-directory-conditional-access-no-modern-authentication/03.png)
94+
95+
- Block Exchange ActiveSync by using Active Directory Federation Services (AD FS) rules.
96+
97+
@RuleName = "Block Exchange ActiveSync"
98+
c1:[Type == "http://schemas.microsoft.com/2012/01/requestcontext/claims/x-ms-client-application", Value == "Microsoft.Exchange.ActiveSync"]
99+
=> issue(Type = "http://schemas.microsoft.com/authorization/claims/permit", Value = "false");
100+
101+
102+
103+
104+
### Legacy authentication protocols
105+
106+
In addition to modern authentication, Exchange Online also supports legacy authentication protocols. If legacy authentication protocols are enabled, your conditional access policies for Exchange Online are not enforced for clients that don't use modern authentication.
107+
108+
You can disable legacy authentication protocols for Exchange Online by setting AD FS rules. This blocks access from:
109+
110+
- Older Office clients, such as Office 2013 that don't have modern authentication enabled
111+
112+
- Earlier versions of Office
113+
114+
115+
## Set up AD FS rules
116+
117+
You can use the following issuance authorization rules to enable or block traffic at the AD FS level.
118+
119+
### Block legacy traffic from the extranet
120+
121+
By applying the following three rules:
122+
123+
- You enable access for:
124+
- Exchange ActiveSync traffic
125+
- Browser traffic
126+
- Modern authentication traffic
127+
- You block access for:
128+
- Legacy client apps from the extranet
129+
130+
**Rule 1:**
48131

49-
##### Rule 1
50132
@RuleName = "Allow all intranet traffic"
51133
c1:[Type == "http://schemas.microsoft.com/ws/2012/01/insidecorporatenetwork", Value == "true"]
52134
=> issue(Type = "http://schemas.microsoft.com/authorization/claims/permit", Value = "true");
53135

54-
##### Rule 2
136+
**Rule 2:**
137+
55138
@RuleName = "Allow Exchange ActiveSync"
56139
c1:[Type == "http://schemas.microsoft.com/2012/01/requestcontext/claims/x-ms-client-application", Value == "Microsoft.Exchange.ActiveSync"]
57140
=> issue(Type = "http://schemas.microsoft.com/authorization/claims/permit", Value = "true");
58141

59-
##### Rule 3
142+
**Rule 3:**
143+
60144
@RuleName = "Allow extranet browser and browser dialog traffic"
61145
c1:[Type == "http://schemas.microsoft.com/ws/2012/01/insidecorporatenetwork", Value == "false"] &&
62146
c2:[Type == "http://schemas.microsoft.com/2012/01/requestcontext/claims/x-ms-endpoint-absolute-path", Value =~ "(/adfs/ls)|(/adfs/oauth2)"]
63147
=> issue(Type = "http://schemas.microsoft.com/authorization/claims/permit", Value = "true");
64148

65-
#### Option 2: Allow Exchange ActiveSync, and block legacy apps
66-
By applying the following three rules to the AD FS relying party trust for Microsoft Office 365 Identity Platform, Exchange ActiveSync traffic, and browser and modern authentication traffic, have access. Legacy apps are blocked from any location.
149+
### Block legacy traffic from anywhere
150+
151+
By applying the following three rules:
152+
153+
- You enable access for:
154+
- Exchange ActiveSync traffic
155+
- Browser traffic
156+
- Modern authentication traffic
157+
- You block access for:
158+
- Legacy apps from any location
67159

68160
##### Rule 1
69161
@RuleName = "Allow all intranet traffic only for browser and modern authentication clients"

articles/active-directory/device-management-faq.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,13 +12,25 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 09/01/2017
15+
ms.date: 09/13/2017
1616
ms.author: markvi
1717
ms.reviewer: jairoc
1818

1919
---
2020
# Azure Active Directory device management FAQ
2121

22+
23+
24+
**Q: How can I register a macOS device?**
25+
26+
**A:** To register macOS device:
27+
28+
1. [Create a compliance policy](https://docs.microsoft.com/intune/compliance-policy-create-mac-os)
29+
2. [Define a conditional access policy for macOS devices](active-directory-conditional-access-azure-portal.md)
30+
3. Users covered under CA will need supported version of Office for macOS applications to use the resources. Once with the right set of applications, users will be prompted to enroll the device using company portal.
31+
32+
---
33+
2234
**Q: I registered the device recently. Why can’t I see the device under my user info in the Azure portal?**
2335

2436
**A:** Windows 10 devices that are domain-joined with automatic device registration do not show up under the USER info.
5.13 KB
Loading
2.75 KB
Loading
11.7 KB
Loading
14.4 KB
Loading
5.35 KB
Loading

0 commit comments

Comments
 (0)