Skip to content

Commit 9d3fd68

Browse files
authored
Merge pull request #191952 from MicrosoftDocs/main
3/16 PM Publish
2 parents cbc12c9 + bcd41cb commit 9d3fd68

File tree

91 files changed

+1674
-1152
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

91 files changed

+1674
-1152
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25215,7 +25215,7 @@
2521525215
},
2521625216
{
2521725217
"source_path_from_root": "/articles/azure-sql/managed-instance/azure-app-sync-network-configuration.md",
25218-
"redirect_url": "/azure/azure-sql/managed-instance/index.yml",
25218+
"redirect_url": "/azure/azure-sql/managed-instance/",
2521925219
"redirect_document_id": false
2522025220
},
2522125221
{

articles/active-directory-b2c/partner-bindid.md

Lines changed: 172 additions & 175 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 07/26/2021
9+
ms.date: 03/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -48,7 +48,7 @@ [email protected],1234567,2234567abcdef2234567abcdef,60,Contoso,HardwareKey
4848
```
4949

5050
> [!NOTE]
51-
> Make sure you include the header row in your CSV file. If a UPN has a single quote, escape it with another single quote. For example, if the UPN is my’[email protected], change it to my’’[email protected] when uploading the file.
51+
> Make sure you include the header row in your CSV file.
5252
5353
Once properly formatted as a CSV file, a Global Administrator can then sign in to the Azure portal, navigate to **Azure Active Directory > Security > MFA > OATH tokens**, and upload the resulting CSV file.
5454

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,7 @@ Run the following steps in each domain and forest in your organization that cont
9898
1. Open a PowerShell prompt using the Run as administrator option.
9999
1. Run the following PowerShell commands to create a new Azure AD Kerberos Server object both in your on-premises Active Directory domain and in your Azure Active Directory tenant.
100100

101+
### Example 1 prompt for all credentials
101102
> [!NOTE]
102103
> Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
103104
@@ -117,6 +118,7 @@ Run the following steps in each domain and forest in your organization that cont
117118
Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred
118119
```
119120

121+
### Example 2 prompt for cloud credential
120122
> [!NOTE]
121123
> If you're working on a domain-joined machine with an account that has domain administrator privileges, you can skip the "-DomainCredential" parameter. If the "-DomainCredential" parameter isn't provided, the current Windows login credential is used to access your on-premises Active Directory Domain Controller.
122124
@@ -134,6 +136,7 @@ Run the following steps in each domain and forest in your organization that cont
134136
Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred
135137
```
136138

139+
### Example 3 prompt for all credentials using modern authentication
137140
> [!NOTE]
138141
> If your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator.
139142
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
@@ -156,6 +159,26 @@ Run the following steps in each domain and forest in your organization that cont
156159
Set-AzureADKerberosServer -Domain $domain -UserPrincipalName $userPrincipalName -DomainCredential $domainCred
157160
```
158161

162+
### Example 4 prompt for cloud credentials using modern authentication
163+
> [!NOTE]
164+
> If you are working on a domain-joined machine with an account that has domain administrator privileges and your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator. And you can skip the "-DomainCredential" parameter.
165+
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
166+
> - Replace `[email protected]` in the following example with the UPN of a global administrator.
167+
168+
```powershell
169+
# Specify the on-premises Active Directory domain. A new Azure AD
170+
# Kerberos Server object will be created in this Active Directory domain.
171+
$domain = "contoso.corp.com"
172+
173+
# Enter a UPN of an Azure Active Directory global administrator
174+
$userPrincipalName = "[email protected]"
175+
176+
# Create the new Azure AD Kerberos Server object in Active Directory
177+
# and then publish it to Azure Active Directory.
178+
# Open an interactive sign-in prompt with given username to access the Azure AD.
179+
Set-AzureADKerberosServer -Domain $domain -UserPrincipalName $userPrincipalName
180+
```
181+
159182
### View and verify the Azure AD Kerberos Server
160183

161184
You can view and verify the newly created Azure AD Kerberos Server by using the following command:
@@ -263,6 +286,12 @@ Make sure that enough DCs are patched to respond in time to service your resourc
263286
> [!NOTE]
264287
> The `/keylist` switch in the `nltest` command is available in client Windows 10 v2004 and later.
265288
289+
### What if I have a CloudTGT but it never gets exchange for a OnPremTGT when I am using Windows Hello for Business Cloud Trust?
290+
291+
Make sure that the user you are signed in as, is a member of the groups of users that can use FIDO2 as an authentication method, or enable it for all users.
292+
293+
> [!NOTE]
294+
> Even if you are not explicitly using a security key to sign-in to your device, the underlying technology is dependent on the FIDO2 infrastructure requirements.
266295
267296
### Do FIDO2 security keys work in a Windows login with RODC present in the hybrid environment?
268297

articles/active-directory/cloud-sync/how-to-prerequisites.md

Lines changed: 45 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -104,28 +104,10 @@ Run the [IdFix tool](/office365/enterprise/prepare-directory-attributes-for-sync
104104

105105
2. The PowerShell execution policy on the local server must be set to Undefined or RemoteSigned.
106106

107-
3. If there's a firewall between your servers and Azure AD, configure the following items:
108-
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
109-
110-
| Port number | How it's used |
111-
| --- | --- |
112-
| **80** | Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate. |
113-
| **443** | Handles all outbound communication with the service. |
114-
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed in the Azure AD portal. |
115-
116-
- If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
117-
- If your firewall or proxy allows you to specify safe suffixes, add connections to \*.msappproxy.net and \*.servicebus.windows.net. If not, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
118-
- If you are installing against the **US government** cloud, and your firewall or proxy allows you to specify safe suffixes, add connections to:
119-
- *.microsoftonline.us
120-
- *.microsoft.us
121-
- *.msappproxy.us
122-
- *.windowsazure.us
123-
124-
- Your agents need access to login.windows.net and login.microsoftonline.com for initial registration. Open your firewall for those URLs as well.
125-
- For certificate validation, unblock the following URLs: mscrl.microsoft.com:80, crl.microsoft.com:80, ocsp.msocsp.com:80, and www\.microsoft.com:80. These URLs are used for certificate validation with other Microsoft products, so you might already have these URLs unblocked.
126-
127-
>[!NOTE]
128-
> Installing the cloud provisioning agent on Windows Server Core is not supported.
107+
3. If there's a firewall between your servers and Azure AD, configure see [Firewall and proxy requirements](#firewall-and-proxy-requirements) below.
108+
109+
>[!NOTE]
110+
> Installing the cloud provisioning agent on Windows Server Core is not supported.
129111
130112
### Additional requirements
131113

@@ -150,6 +132,47 @@ To enable TLS 1.2, follow these steps.
150132
```
151133
152134
1. Restart the server.
135+
136+
## Firewall and Proxy requirements
137+
If there's a firewall between your servers and Azure AD, configure the following items:
138+
139+
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
140+
141+
| Port number | How it's used |
142+
| --- | --- |
143+
| **80** | Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate. |
144+
| **443** | Handles all outbound communication with the service. |
145+
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed in the Azure AD portal. |
146+
147+
- If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
148+
- If your firewall or proxy allows you to specify safe suffixes, add connections:
149+
150+
#### [Public Cloud](#tab/public-cloud)
151+
152+
153+
|URL |How it's used|
154+
|-----|-----|
155+
|&#42;.msappproxy.net</br>&#42;.servicebus.windows.net|The agent uses these URLs to communicate with the Azure AD cloud service. |
156+
|&#42;.microsoftonline.com</br>&#42;.microsoft.com</br>&#42;.msappproxy.com</br>&#42;.windowsazure.com|The agent uses these URLs to communicate with the Azure AD cloud service. |
157+
|`mscrl.microsoft.com:80` </br>`crl.microsoft.com:80` </br>`ocsp.msocsp.com:80` </br>`www.microsoft.com:80`| The agent uses these URLs to verify certificates.|
158+
|login.windows.net</br>|The agent uses these URLs during the registration process.
159+
160+
161+
162+
#### [U.S. Government Cloud](#tab/us-government-cloud)
163+
164+
|URL |How it's used|
165+
|-----|-----|
166+
|&#42;.msappproxy.us</br>&#42;.servicebus.usgovcloudapi.net|The agent uses these URLs to communicate with the Azure AD cloud service. |
167+
|`mscrl.microsoft.us:80` </br>`crl.microsoft.us:80` </br>`ocsp.msocsp.us:80` </br>`www.microsoft.us:80`| The agent uses these URLs to verify certificates.|
168+
|login.windows.us </br>secure.aadcdn.microsoftonline-p.com </br>&#42;.microsoftonline.us </br>&#42;.microsoftonline-p.us </br>&#42;.msauth.net </br>&#42;.msauthimages.net </br>&#42;.msecnd.net</br>&#42;.msftauth.net </br>&#42;.msftauthimages.net</br>&#42;.phonefactor.net </br>enterpriseregistration.windows.net</br>management.azure.com </br>policykeyservice.dc.ad.msft.net</br>ctldl.windowsupdate.us:80| The agent uses these URLs during the registration process.
169+
170+
171+
172+
173+
- If you are unable to add connections, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
174+
175+
---
153176
## NTLM requirement
154177
155178
You should not enable NTLM on the Windows Server that is running the Azure AD Connect Provisioning Agent and if it is enabled you should make sure you disable it.

articles/active-directory/develop/v2-oauth2-on-behalf-of-flow.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,16 @@ The OBO flow only works for user principals at this time. A service principal ca
2424

2525
This article describes how to program directly against the protocol in your application. When possible, we recommend you use the supported Microsoft Authentication Libraries (MSAL) instead to [acquire tokens and call secured web APIs](authentication-flows-app-scenarios.md#scenarios-and-supported-authentication-flows). Also take a look at the [sample apps that use MSAL](sample-v2-code.md).
2626

27-
As of May 2018, some implicit-flow derived `id_token` can't be used for OBO flow. Single-page apps (SPAs) should pass an **access** token to a middle-tier confidential client to perform OBO flows instead. For more info about which clients can perform OBO calls, see [limitations](#client-limitations).
28-
2927
[!INCLUDE [try-in-postman-link](includes/try-in-postman-link.md)]
3028

29+
## Client limitations
30+
31+
As of May 2018, some implicit-flow derived `id_token` can't be used for OBO flow. Single-page apps (SPAs) should pass an **access** token to a middle-tier confidential client to perform OBO flows instead.
32+
33+
If a client uses the implicit flow to get an id_token, and that client also has wildcards in a reply URL, the id_token can't be used for an OBO flow. However, access tokens acquired through the implicit grant flow can still be redeemed by a confidential client even if the initiating client has a wildcard reply URL registered.
34+
35+
Additionally, applications with custom signing keys cannot be used as middle-tier API's in the OBO flow (this includes enterprise applications configured for single sign-on). This will result in an error because tokens signed with a key controlled by the client cannot be safely accepted.
36+
3137
## Protocol diagram
3238

3339
Assume that the user has been authenticated on an application using the [OAuth 2.0 authorization code grant flow](v2-oauth2-auth-code-flow.md) or another login flow. At this point, the application has an access token *for API A* (token A) with the user's claims and consent to access the middle-tier web API (API A). Now, API A needs to make an authenticated request to the downstream web API (API B).
@@ -262,10 +268,6 @@ A tenant admin can guarantee that applications have permission to call their req
262268

263269
In some scenarios, you may only have a single pairing of middle-tier and front-end client. In this scenario, you may find it easier to make this a single application, negating the need for a middle-tier application altogether. To authenticate between the front-end and the web API, you can use cookies, an id_token, or an access token requested for the application itself. Then, request consent from this single application to the back-end resource.
264270

265-
## Client limitations
266-
267-
If a client uses the implicit flow to get an id_token, and that client also has wildcards in a reply URL, the id_token can't be used for an OBO flow. However, access tokens acquired through the implicit grant flow can still be redeemed by a confidential client even if the initiating client has a wildcard reply URL registered.
268-
269271
## Next steps
270272

271273
Learn more about the OAuth 2.0 protocol and another way to perform service to service auth using client credentials.

articles/active-directory/develop/v2-saml-bearer-assertion.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,3 +95,5 @@ For more information about app registration and authentication flow, see:
9595

9696
- [Register an application with the Microsoft identity platform](quickstart-register-app.md)
9797
- [Authentication flows and application scenarios](authentication-flows-app-scenarios.md)
98+
99+
<!-- _This article was originally contributed by [Umesh Barapatre](https://github.com/umeshbarapatre)._ -->

articles/active-directory/hybrid/reference-connect-government-cloud.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,13 @@ The following information describes implementation of Pass-through Authenticatio
3030

3131
Before you deploy the Pass-through Authentication agent, verify whether a firewall exists between your servers and Azure AD. If your firewall or proxy allows Domain Name System (DNS) blocked or safe programs, add the following connections.
3232

33-
> [!NOTE]
34-
> The following guidance also applies to installing the [Azure AD Application Proxy connector](../app-proxy/what-is-application-proxy.md) for Azure Government environments.
33+
> [!IMPORTANT]
34+
> The following guidance applies only to the following:
35+
> - the pass-through authentication agent
36+
> - [Azure AD Application Proxy connector](../app-proxy/what-is-application-proxy.md)
37+
>
38+
> For information on URLS for the Azure Active Directory Connect Provisioning Agent see the [installation pre-requisites](../cloud-sync/how-to-prerequisites.md) for cloud sync.
39+
3540

3641
|URL |How it's used|
3742
|-----|-----|
5.96 KB
Loading

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,8 @@
130130
href: workbook-conditional-access-gap-analyzer.md
131131
- name: Cross-tenant access activity
132132
href: workbook-cross-tenant-access-activity.md
133+
- name: Sign-ins using legacy authentication
134+
href: workbook-legacy authentication.md
133135
- name: Risk analysis
134136
href: workbook-risk-analysis.md
135137
- name: Sensitive Operations Report

0 commit comments

Comments
 (0)