Skip to content

Commit 96e493b

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 79f1ac0 + 84a94db commit 96e493b

File tree

90 files changed

+2226
-799
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

90 files changed

+2226
-799
lines changed

articles/active-directory-b2c/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -331,6 +331,8 @@
331331
displayName: TOTP, time-based-one-time password, time-based one-time password, authenticator app, Microsoft authenticator app, mfa, 2fa
332332
- name: Partner integration
333333
items:
334+
- name: Transmit Security
335+
href: partner-bindid.md
334336
- name: BlokSec
335337
href: partner-bloksec.md
336338
- name: Haventec
76.7 KB
Loading
5.14 KB
Loading

articles/active-directory-b2c/partner-bindid.md

Lines changed: 342 additions & 0 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/partner-gallery.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
4141

4242
| ISV partner | Description and integration walkthroughs |
4343
|:-------------------------|:--------------|
44+
|![Screenshot of a bindid logo](./media/partner-gallery/bindid-logo.png) | [Transmit Security's](./partner-bindid.md) solution BindID is a passwordless authentication service that uses strong FIDO2 biometric authentication for a reliable omni-channel authentication experience, which ensures a smooth login experience for customers across every device and channel eliminating fraud, phishing, and credential reuse. |
4445
| ![Screenshot of a bloksec logo](./media/partner-gallery/bloksec-logo.png) | [BlokSec](./partner-bloksec.md) is a passwordless authentication and tokenless MFA solution, which provides real-time consent-based services and protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks. |
4546
| ![Screenshot of a haventec logo](./media/partner-gallery/haventec-logo.png) | [Haventec](./partner-haventec.md) is a passwordless authentication provider, which provides decentralized identity platform that eliminates passwords, shared secrets, and friction. |
4647
| ![Screenshot of a hypr logo](./media/partner-gallery/hypr-logo.png) | [Hypr](./partner-hypr.md) is a passwordless authentication provider, which replaces passwords with public key encryptions eliminating fraud, phishing, and credential reuse. |

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/16/2022
9+
ms.date: 03/1/2022
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: karenhoran
14-
ms.reviewer: rhicock
14+
ms.reviewer: tilarso
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -21,6 +21,7 @@ Before combined registration, users registered authentication methods for Azure
2121

2222
> [!NOTE]
2323
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration.
24+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to utilize the sepperate legacy registration workflows for MFA and SSPR.
2425
2526
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
2627

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -156,6 +156,10 @@ A major step in every multifactor authentication deployment is getting users reg
156156

157157
### Combined registration for SSPR and Azure AD MFA
158158

159+
> [!NOTE]
160+
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
161+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to disable the combined registration experience.
162+
159163
We recommend that organizations use the [combined registration experience for Azure AD Multi-Factor Authentication and self-service password reset (SSPR)](howto-registration-mfa-sspr-combined.md). SSPR allows users to reset their password in a secure way using the same methods they use for Azure AD Multi-Factor Authentication. Combined registration is a single step for end users. To make sure you understand the functionality and end-user experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
160164

161165
It's critical to inform users about upcoming changes, registration requirements, and any necessary user actions. We provide [communication templates](https://aka.ms/mfatemplates) and [user documentation](https://support.microsoft.com/account-billing/set-up-security-info-from-a-sign-in-page-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout. Send users to https://myprofile.microsoft.com to register by selecting the **Security Info** link on that page.

articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/28/2021
9+
ms.date: 03/1/2022
1010

1111
ms.author: justinha
1212
author: justinha
1313
manager: karenhoran
14-
ms.reviewer: rhicock
14+
ms.reviewer: tilarso
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -21,6 +21,7 @@ Before combined registration, users registered authentication methods for Azure
2121

2222
> [!NOTE]
2323
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
24+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to utilize the sepperate legacy registration workflows for MFA and SSPR.
2425
2526
To make sure you understand the functionality and effects before you enable the new experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
2627

articles/active-directory/authentication/howto-sspr-deployment.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,10 @@ Before deploying SSPR, you may opt to determine the number and the average cost
110110

111111
### Combined registration for SSPR and Azure AD Multi-Factor Authentication
112112

113+
> [!NOTE]
114+
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
115+
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration. After this date tenants will be unable to disable the combined registration experience.
116+
113117
We recommend that organizations use the [combined registration experience for Azure AD Multi-Factor Authentication and self-service password reset (SSPR)](howto-registration-mfa-sspr-combined.md). SSPR allows users to reset their password in a secure way using the same methods they use for Azure AD Multi-Factor Authentication. Combined registration is a single step for end users. To make sure you understand the functionality and end-user experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
114118

115119
It's critical to inform users about upcoming changes, registration requirements, and any necessary user actions. We provide [communication templates](https://aka.ms/mfatemplates) and [user documentation](https://support.microsoft.com/account-billing/set-up-security-info-from-a-sign-in-page-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout. Send users to https://myprofile.microsoft.com to register by selecting the **Security Info** link on that page.

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: how-to
9-
ms.date: 02/28/2022
9+
ms.date: 03/01/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -299,14 +299,14 @@ This Exit code translates to `DSREG_AUTOJOIN_DISC_FAILED` because the extension
299299

300300
1. Verify the required endpoints are accessible from the VM using PowerShell:
301301

302-
- `curl https://login.microsoftonline.com// -D`
303-
- `curl https://login.microsoftonline.com/<TenantID>// -D`
304-
- `curl https://enterpriseregistration.windows.net// -D`
305-
- `curl https://device.login.microsoftonline.com// -D`
306-
- `curl https://pas.windows.net// -D`
302+
- `curl https://login.microsoftonline.com/ -D -`
303+
- `curl https://login.microsoftonline.com/<TenantID>/ -D -`
304+
- `curl https://enterpriseregistration.windows.net/ -D -`
305+
- `curl https://device.login.microsoftonline.com/ -D -`
306+
- `curl https://pas.windows.net/ -D -`
307307

308308
> [!NOTE]
309-
> Replace `<TenantID>` with the Azure AD Tenant ID that is associated with the Azure subscription. If you need to find the tenant ID, you can hover over your account name to get the directory / tenant ID, or select **Azure Active Directory > Properties > Directory ID** in the Azure portal.<br/>`enterpriseregistration.windows.net` and `pas.windows.net` should return 404 Not Found, which is expected behavior.
309+
> Replace `<TenantID>` with the Azure AD Tenant ID that is associated with the Azure subscription. If you need to find the tenant ID, you can hover over your account name to get the directory / tenant ID, or select **Azure Active Directory > Properties > Directory ID** in the Azure portal.<br/> Attempt to connect to `enterpriseregistration.windows.net` may return 404 Not Found, which is expected behavior.<br/> Attempt to connect to `pas.windows.net` may prompt for pin credentials (you do not need to enter the pin) or may return 404 Not Found. Either one is sufficient to verify the URL is reachable.
310310
311311
1. If any of the commands fails with "Could not resolve host `<URL>`", try running this command to determine the DNS server that is being used by the VM.
312312

0 commit comments

Comments
 (0)