Skip to content

Commit aad8800

Browse files
committed
2 parents e52c02d + 9aef560 commit aad8800

File tree

492 files changed

+41946
-38486
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

492 files changed

+41946
-38486
lines changed

.openpublishing.redirection.json

Lines changed: 34271 additions & 34271 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.virtual-desktop.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,16 @@
1919
"source_path_from_root": "/articles/virtual-desktop/create-profile-container-adds.md",
2020
"redirect_url": "/azure/virtual-desktop/fslogix-profile-container-configure-azure-files-active-directory",
2121
"redirect_document_id": true
22+
},
23+
{
24+
"source_path_from_root": "/articles/virtual-desktop/shortpath.md",
25+
"redirect_url": "/azure/virtual-desktop/rdp-shortpath",
26+
"redirect_document_id": true
27+
},
28+
{
29+
"source_path_from_root": "/articles/virtual-desktop/shortpath-public.md",
30+
"redirect_url": "/azure/virtual-desktop/rdp-shortpath",
31+
"redirect_document_id": false
2232
}
2333
]
2434
}

articles/active-directory-domain-services/faqs.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,11 @@ sections:
164164
How are Windows Updates applied in Azure AD Domain Services?
165165
answer: |
166166
Domain controllers in a managed domain automatically apply required Windows updates. There's nothing for you to configure or administer here. Make sure you don't create network security group rules that block outbound traffic to Windows Updates. For your own VMs joined to the managed domain, you are responsible for configuring and applying any required OS and application updates.
167+
168+
- question: |
169+
Why do my domain controllers change names?
170+
answer: |
171+
It is possible that during the maintenance of domain controllers there is a change in their names. To avoid problems with this type of change, it is recommended to not use the names of the domain controllers hardcoded in applications and/or other domain resources, but the FQDN of the domain. This way, no matter what the names of the domain controllers are, you won't need to reconfigure anything after a name change.
167172
168173
- name: Billing and availability
169174
questions:

articles/active-directory/authentication/active-directory-certificate-based-authentication-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ manager: amycolannino
1414
ms.reviewer: annaba
1515

1616
ms.collection: M365-identity-device-management
17-
ms.custom: has-adal-ref
17+
1818
---
1919
# Get started with certificate-based authentication in Azure Active Directory with federation
2020

@@ -37,7 +37,7 @@ This topic:
3737

3838
To configure CBA with federation, the following statements must be true:
3939

40-
- CBA with federation is only supported for Federated environments for browser applications, native clients using modern authentication (ADAL), or MSAL libraries. The one exception is Exchange Active Sync (EAS) for Exchange Online (EXO), which can be used for federated and managed accounts. To configure Azure AD CBA without needing federation, see [How to configure Azure AD certificate-based authentication](how-to-certificate-based-authentication.md).
40+
- CBA with federation is only supported for Federated environments for browser applications, native clients using modern authentication, or MSAL libraries. The one exception is Exchange Active Sync (EAS) for Exchange Online (EXO), which can be used for federated and managed accounts. To configure Azure AD CBA without needing federation, see [How to configure Azure AD certificate-based authentication](how-to-certificate-based-authentication.md).
4141
- The root certificate authority and any intermediate certificate authorities must be configured in Azure Active Directory.
4242
- Each certificate authority must have a certificate revocation list (CRL) that can be referenced via an internet-facing URL.
4343
- You must have at least one certificate authority configured in Azure Active Directory. You can find related steps in the [Configure the certificate authorities](#step-2-configure-the-certificate-authorities) section.

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 6 additions & 383 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 6 additions & 253 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 09/01/2022
7+
ms.date: 09/09/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -13,7 +13,7 @@ ms.collection: M365-identity-device-management
1313
---
1414
# How to use number matching in multifactor authentication (MFA) notifications (Preview) - Authentication Methods Policy
1515

16-
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security. Number matching can be enabled by using the Azure portal or Microsoft Graph API.
16+
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security. The schema for the API to enable number match is currently being updated. **While the API is updated over the next two weeks, you should only use the Azure AD portal to enable number match.**
1717

1818
>[!NOTE]
1919
>Number matching is a key security upgrade to traditional second factor notifications in Microsoft Authenticator that will be enabled by default for all tenants a few months after general availability (GA).<br>
@@ -25,6 +25,8 @@ Your organization will need to enable Authenticator (traditional second factor)
2525

2626
## Number matching
2727

28+
<!---check below with Mayur. The bit about the policy came from the number match FAQ at the end.--->
29+
2830
Number matching can be targeted to only a single group, which can be dynamic or nested. On-premises synchronized security groups and cloud-only security groups are supported for the Authentication Method Policy.
2931

3032
Number matching is available for the following scenarios. When enabled, all scenarios support number matching.
@@ -84,256 +86,7 @@ To create the registry key that overrides push notifications:
8486

8587
## Enable number matching
8688

87-
88-
>[!NOTE]
89-
>In Graph Explorer, ensure you've consented to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
90-
91-
Identify your single target group for the schema configuration. Then use the following API endpoint to change the numberMatchingRequiredState property under featureSettings to **enabled** and include or exclude groups:
92-
93-
```http
94-
https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
95-
```
96-
97-
98-
### MicrosoftAuthenticatorAuthenticationMethodConfiguration properties
99-
100-
**PROPERTIES**
101-
102-
| Property | Type | Description |
103-
|---------|------|-------------|
104-
| id | String | The authentication method policy identifier. |
105-
| state | authenticationMethodState | Possible values are: **enabled**<br>**disabled** |
106-
107-
**RELATIONSHIPS**
108-
109-
| Relationship | Type | Description |
110-
|--------------|------|-------------|
111-
| includeTargets | [microsoftAuthenticatorAuthenticationMethodTarget](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget?view=graph-rest-beta&preserve-view=true) collection | A collection of users or groups who are enabled to use the authentication method |
112-
| featureSettings | [microsoftAuthenticatorFeatureSettings](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) collection | A collection of Microsoft Authenticator features. |
113-
114-
### MicrosoftAuthenticator includeTarget properties
115-
116-
**PROPERTIES**
117-
118-
| Property | Type | Description |
119-
|----------|------|-------------|
120-
| authenticationMode | String | Possible values are:<br>**any**: Both passwordless phone sign-in and traditional second factor notifications are allowed.<br>**deviceBasedPush**: Only passwordless phone sign-in notifications are allowed.<br>**push**: Only traditional second factor push notifications are allowed. |
121-
| id | String | Object ID of an Azure AD user or group. |
122-
| targetType | authenticationMethodTargetType | Possible values are: **user**, **group**.|
123-
124-
125-
126-
### MicrosoftAuthenticator featureSettings properties
127-
128-
**PROPERTIES**
129-
130-
| Property | Type | Description |
131-
|----------|------|-------------|
132-
| numberMatchingRequiredState | authenticationMethodFeatureConfiguration | Require number matching for MFA notifications. Value is ignored for phone sign-in notifications. |
133-
| displayAppInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown application name in Microsoft Authenticator notification. |
134-
| displayLocationInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown geographic location context in Microsoft Authenticator notification. |
135-
136-
### Authentication Method Feature Configuration properties
137-
138-
**PROPERTIES**
139-
140-
| Property | Type | Description |
141-
|----------|------|-------------|
142-
| excludeTarget | featureTarget | A single entity that is excluded from this feature. <br> Please note: You will be able to only exclude one group for number matching. |
143-
| includeTarget | featureTarget | A single entity that is included in this feature. <br> Please note: You will be able to only set one group for number matching. |
144-
| State | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
145-
146-
### Feature Target properties
147-
148-
**PROPERTIES**
149-
150-
| Property | Type | Description |
151-
|----------|------|-------------|
152-
| id | String | ID of the entity targeted. |
153-
| targetType | featureTargetType | The kind of entity targeted, such as group, role, or administrative unit. The possible values are: ‘group’, 'administrativeUnit’, ‘role’, unknownFutureValue’. |
154-
155-
>[!NOTE]
156-
>Number matching can be enabled only for a single group.
157-
158-
### Example of how to enable number matching for all users
159-
160-
In **featureSettings**, you will need to change the **numberMatchingRequiredState** from **default** to **enabled**.
161-
162-
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we will use **any**, but if you do not want to allow passwordless, use **push**.
163-
164-
>[!NOTE]
165-
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
166-
167-
You might need to patch the entire schema to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example only shows the update to the **numberMatchingRequiredState** under **featureSettings**.
168-
169-
Only users who are enabled for Microsoft Authenticator under Microsoft Authenticator’s **includeTargets** will see the number match requirement. Users who aren't enabled for Microsoft Authenticator won't see the feature.
170-
171-
```json
172-
//Retrieve your existing policy via a GET.
173-
//Leverage the Response body to create the Request body section. Then update the Request body similar to the Request body as shown below.
174-
//Change the Query to PATCH and Run query
175-
176-
{
177-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
178-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
179-
"id": "MicrosoftAuthenticator",
180-
"state": "enabled",
181-
"featureSettings": {
182-
"numberMatchingRequiredState": {
183-
"state": "enabled",
184-
"includeTarget": {
185-
"targetType": "group",
186-
"id": "all_users"
187-
},
188-
"excludeTarget": {
189-
"targetType": "group",
190-
"id": "00000000-0000-0000-0000-000000000000"
191-
}
192-
}
193-
},
194-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
195-
"includeTargets": [
196-
{
197-
"targetType": "group",
198-
"id": "all_users",
199-
"isRegistrationRequired": false,
200-
"authenticationMode": "any",
201-
}
202-
]
203-
}
204-
205-
```
206-
207-
To confirm this has applied, please run the GET request below using the endpoint below.
208-
209-
```http
210-
GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
211-
```
212-
213-
### Example of how to enable number matching for a single group
214-
215-
In **featureSettings**, you will need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
216-
Inside the **includeTarget**, you will need to change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
217-
218-
You need to PATCH the entire configuration to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **numberMatchingRequiredState**.
219-
220-
Only users who are enabled for Microsoft Authenticator under Microsoft Authenticator’s **includeTargets** will see the number match requirement. Users who aren't enabled for Microsoft Authenticator won't see the feature.
221-
222-
```json
223-
{
224-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
225-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
226-
"id": "MicrosoftAuthenticator",
227-
"state": "enabled",
228-
"featureSettings": {
229-
"numberMatchingRequiredState": {
230-
"state": "enabled",
231-
"includeTarget": {
232-
"targetType": "group",
233-
"id": "1ca44590-e896-4dbe-98ed-b140b1e7a53a"
234-
},
235-
"excludeTarget": {
236-
"targetType": "group",
237-
"id": "00000000-0000-0000-0000-000000000000"
238-
}
239-
}
240-
},
241-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
242-
"includeTargets": [
243-
{
244-
"targetType": "group",
245-
"id": "all_users",
246-
"isRegistrationRequired": false,
247-
"authenticationMode": "any"
248-
}
249-
]
250-
}
251-
```
252-
253-
To verify, RUN GET again and verify the ObjectID
254-
255-
```http
256-
GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
257-
```
258-
259-
### Example of removing the excluded group from number matching
260-
261-
In **featureSettings**, you will need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
262-
You need to change the **id** of the **excludeTarget** to `00000000-0000-0000-0000-000000000000`.
263-
264-
You need to PATCH the entire configuration to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **numberMatchingRequiredState**.
265-
266-
Only users who are enabled for Microsoft Authenticator under Microsoft Authenticator’s **includeTargets** will be excluded from the number match requirement. Users who aren't enabled for Microsoft Authenticator won't see the feature.
267-
268-
```json
269-
{
270-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
271-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
272-
"id": "MicrosoftAuthenticator",
273-
"state": "enabled",
274-
"featureSettings": {
275-
"numberMatchingRequiredState": {
276-
"state": "enabled",
277-
"includeTarget": {
278-
"targetType": "group",
279-
"id": "1ca44590-e896-4dbe-98ed-b140b1e7a53a"
280-
},
281-
"excludeTarget": {
282-
"targetType": "group",
283-
"id": " 00000000-0000-0000-0000-000000000000"
284-
}
285-
}
286-
},
287-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
288-
"includeTargets": [
289-
{
290-
"targetType": "group",
291-
"id": "all_users",
292-
"isRegistrationRequired": false,
293-
"authenticationMode": "any"
294-
}
295-
]
296-
}
297-
```
298-
299-
## Turn off number matching
300-
301-
To turn number matching off, you will need to PATCH remove **numberMatchingRequiredState** from **enabled** to **disabled**/**default**.
302-
303-
```json
304-
{
305-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
306-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
307-
"id": "MicrosoftAuthenticator",
308-
"state": "enabled",
309-
"featureSettings": {
310-
"numberMatchingRequiredState": {
311-
"state": "default",
312-
"includeTarget": {
313-
"targetType": "group",
314-
"id": "1ca44590-e896-4dbe-98ed-b140b1e7a53a"
315-
},
316-
"excludeTarget": {
317-
"targetType": "group",
318-
"id": " 00000000-0000-0000-0000-000000000000"
319-
}
320-
}
321-
},
322-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
323-
"includeTargets": [
324-
{
325-
"targetType": "group",
326-
"id": "all_users",
327-
"isRegistrationRequired": false,
328-
"authenticationMode": "any"
329-
}
330-
]
331-
}
332-
```
333-
334-
## Enable number matching in the portal
335-
336-
To enable number matching in the Azure AD portal, complete the following steps:
89+
To enable number matching, complete the following steps:
33790

33891
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
33992
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone, and change **Authentication mode** to **Push**.
@@ -348,4 +101,4 @@ To enable number matching in the Azure AD portal, complete the following steps:
348101

349102
## Next steps
350103

351-
[Authentication methods in Azure Active Directory](concept-authentication-authenticator-app.md)
104+
[Authentication methods in Azure Active Directory](concept-authentication-authenticator-app.md)

0 commit comments

Comments
 (0)