Skip to content

Commit aaff63c

Browse files
authored
Merge pull request #236773 from MicrosoftDocs/main
5/03 AM Publish
2 parents 9081d44 + 8962df4 commit aaff63c

File tree

139 files changed

+1546
-517
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

139 files changed

+1546
-517
lines changed

articles/active-directory-b2c/whats-new-docs.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 03/06/2023
4+
ms.date: 05/03/2023
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,13 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
## April 2023
19+
20+
### Updated articles
21+
22+
- [Configure Transmit Security with Azure Active Directory B2C for passwordless authentication](partner-bindid.md) - Update partner-bindid.md
23+
- [Tutorial: Enable secure hybrid access for applications with Azure Active Directory B2C and F5 BIG-IP](partner-f5.md) - Update partner-f5.md
24+
1825
## March 2023
1926

2027
### Updated articles

articles/active-directory/app-provisioning/provision-on-demand.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 01/23/2023
11+
ms.date: 05/03/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
zone_pivot_groups: app-provisioning-cross-tenant-synchronization
@@ -48,7 +48,7 @@ Use on-demand provisioning to provision a user or group in seconds. Among other
4848

4949
5. Select **Provision on demand**.
5050

51-
6. Search for a user by first name, last name, display name, user principal name, or email address. Alternatively, you can search for a group and pick up to 5 users.
51+
6. Search for a user by first name, last name, display name, user principal name, or email address. Alternatively, you can search for a group and pick up to five users.
5252
> [!NOTE]
5353
> For Cloud HR provisioning app (Workday/SuccessFactors to AD/Azure AD), the input value is different.
5454
> For Workday scenario, please provide "WorkerID" or "WID" of the user in Workday.
@@ -61,7 +61,7 @@ Use on-demand provisioning to provision a user or group in seconds. Among other
6161

6262
## Understand the provisioning steps
6363

64-
The on-demand provisioning process attempts to show the steps that the provisioning service takes when provisioning a user. There are typically five steps to provision a user. One or more of those steps, explained in the following sections, will be shown during the on-demand provisioning experience.
64+
The on-demand provisioning process attempts to show the steps that the provisioning service takes when provisioning a user. There are typically five steps to provision a user. One or more of those steps, explained in the following sections, are shown during the on-demand provisioning experience.
6565

6666
### Step 1: Test connection
6767

@@ -116,7 +116,7 @@ The **View details** section shows the scoping conditions that were evaluated. Y
116116

117117
#### Troubleshooting tips
118118

119-
* Make sure that you've defined a valid scoping role. For example, avoid using the [Greater_Than operator](./define-conditional-rules-for-provisioning-user-accounts.md#create-a-scoping-filter) with a non-integer value.
119+
* Make sure that you've defined a valid scoping role. For example, avoid using the [Greater_Than operator](./define-conditional-rules-for-provisioning-user-accounts.md#create-a-scoping-filter) with a noninteger value.
120120
* If the user doesn't have the necessary role, review the [tips for provisioning users assigned to the default access role](./application-provisioning-config-problem-no-users-provisioned.md#provisioning-users-assigned-to-the-default-access-role).
121121

122122
### Step 4: Match user between source and target
@@ -125,11 +125,11 @@ In this step, the service attempts to match the user that was retrieved in the i
125125

126126
#### View details
127127

128-
The **View details** page shows the properties of the users that were matched in the target system. The properties that you see in the context pane vary as follows:
128+
The **View details** page shows the properties of the users that were matched in the target system. The context pane changes as follows:
129129

130-
* If no users are matched in the target system, you won't see any properties.
131-
* If there's one user matched in the target system, you'll see the properties of that matched user from the target system.
132-
* If multiple users are matched, you'll see the properties of both matched users.
130+
* If no users are matched in the target system, no properties are shown.
131+
* If one user matches in the target system, the properties of that user are shown.
132+
* If multiple users match, the properties of both users are shown.
133133
* If multiple matching attributes are part of your attribute mappings, each matching attribute is evaluated sequentially and the matched users for that attribute are shown.
134134

135135
#### Troubleshooting tips
@@ -152,11 +152,11 @@ The **View details** section displays the attributes that were modified in the t
152152
#### Troubleshooting tips
153153

154154
* Failures for exporting changes can vary greatly. Check the [documentation for provisioning logs](../reports-monitoring/concept-provisioning-logs.md#error-codes) for common failures.
155-
* On-demand provisioning says the group or user can't be provisioned because they're not assigned to the application. Note that there's a replicate delay of up to a few minutes between when an object is assigned to an application and that assignment being honored by on-demand provisioning. You may need to wait a few minutes and try again.
155+
* On-demand provisioning says the group or user can't be provisioned because they're not assigned to the application. There's a replication delay of up to a few minutes between when an object is assigned to an application and when that assignment is honored in on-demand provisioning. You may need to wait a few minutes and try again.
156156

157157
## Frequently asked questions
158158

159-
* **Do you need to turn provisioning off to use on-demand provisioning?** For applications that use a long-lived bearer token or a user name and password for authorization, no additional steps are required. Applications that use OAuth for authorization currently require the provisioning job to be stopped before using on-demand provisioning. Applications such as G Suite, Box, Workplace by Facebook, and Slack fall into this category. Work is in progress to support on-demand provisioning for all applications without having to stop provisioning jobs.
159+
* **Do you need to turn provisioning off to use on-demand provisioning?** For applications that use a long-lived bearer token or a user name and password for authorization, no more steps are required. Applications that use OAuth for authorization currently require the provisioning job to be stopped before using on-demand provisioning. Applications such as G Suite, Box, Workplace by Facebook, and Slack fall into this category. Work is in progress to support on-demand provisioning for all applications without having to stop provisioning jobs.
160160

161161
* **How long does on-demand provisioning take?** On-demand provisioning typically takes less than 30 seconds.
162162

@@ -168,12 +168,12 @@ There are currently a few known limitations to on-demand provisioning. Post your
168168
> [!NOTE]
169169
> The following limitations are specific to the on-demand provisioning capability. For information about whether an application supports provisioning groups, deletions, or other capabilities, check the tutorial for that application.
170170
171-
* On-demand provisioning of groups supports updating up to 5 members at a time
171+
* On-demand provisioning of groups supports updating up to five members at a time
172172
::: zone-end
173-
* Restoring a previously soft-deleted user in the target tenant with on-demand provisioning isn't supported. If you try to soft delete a user with on-demand provisioning and then restore the user, it can result in duplicate users.
173+
* Restoring a previously soft-deleted user in the target tenant with on-demand provisioning isn't supported. If you try to soft-delete a user with on-demand provisioning and then restore the user, it can result in duplicate users.
174174
* On-demand provisioning of roles isn't supported.
175-
* On-demand provisioning supports disabling users that have been unassigned from the application. However, it doesn't support disabling or deleting users that have been disabled or deleted from Azure AD. Those users won't appear when you search for a user.
176-
* On-demand provisioning does not support nested groups that are not directly assigned to the application.
175+
* On-demand provisioning supports disabling users that have been unassigned from the application. However, it doesn't support disabling or deleting users that have been disabled or deleted from Azure AD. Those users don't appear when you search for a user.
176+
* On-demand provisioning doesn't support nested groups that aren't directly assigned to the application.
177177

178178
## Next steps
179179

articles/active-directory/app-provisioning/skip-out-of-scope-deletions.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
title: Skip deletion of out of scope users in Azure Active Directory Application Provisioning
3-
description: Learn how to override the default behavior of de-provisioning out of scope users in Azure Active Directory.
3+
description: Learn how to override the default behavior of deprovisioning out of scope users in Azure Active Directory.
44
services: active-directory
55
author: kenwith
66
manager:
77
ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: how-to
1010
ms.workload: identity
11-
ms.date: 01/23/2023
11+
ms.date: 05/03/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -17,15 +17,15 @@ ms.reviewer: arvinh
1717
By default, the Azure AD provisioning engine soft deletes or disables users that go out of scope. However, for certain scenarios like Workday to AD User Inbound Provisioning, this behavior may not be the expected and you may want to override this default behavior.
1818

1919
This article describes how to use the Microsoft Graph API and the Microsoft Graph API explorer to set the flag ***SkipOutOfScopeDeletions*** that controls the processing of accounts that go out of scope.
20-
* If ***SkipOutOfScopeDeletions*** is set to 0 (false), accounts that go out of scope will be disabled in the target.
21-
* If ***SkipOutOfScopeDeletions*** is set to 1 (true), accounts that go out of scope won't be disabled in the target. This flag is set at the *Provisioning App* level and can be configured using the Graph API.
20+
* If ***SkipOutOfScopeDeletions*** is set to 0 (false), accounts that go out of scope are disabled in the target.
21+
* If ***SkipOutOfScopeDeletions*** is set to 1 (true), accounts that go out of scope aren't disabled in the target. This flag is set at the *Provisioning App* level and can be configured using the Graph API.
2222

23-
Because this configuration is widely used with the *Workday to Active Directory user provisioning* app, the following steps include screenshots of the Workday application. However, the configuration can also be used with *all other apps*, such as ServiceNow, Salesforce, and Dropbox and [cross-tenant synchronization](../multi-tenant-organizations/cross-tenant-synchronization-configure.md). Note that in order to successfully complete this procedure you must have first set up app provisioning for the app. Each app has its own configuration article. For example, to configure the Workday application, see [Tutorial: Configure Workday to Azure AD user provisioning](../saas-apps/workday-inbound-cloud-only-tutorial.md).
23+
Because this configuration is widely used with the *Workday to Active Directory user provisioning* app, the following steps include screenshots of the Workday application. However, the configuration can also be used with *all other apps*, such as ServiceNow, Salesforce, and Dropbox and [cross-tenant synchronization](../multi-tenant-organizations/cross-tenant-synchronization-configure.md). To successfully complete this procedure, you must have first set up app provisioning for the app. Each app has its own configuration article. For example, to configure the Workday application, see [Tutorial: Configure Workday to Azure AD user provisioning](../saas-apps/workday-inbound-cloud-only-tutorial.md).
2424

2525
## Step 1: Retrieve your Provisioning App Service Principal ID (Object ID)
2626

27-
1. Launch the [Azure portal](https://portal.azure.com), and navigate to the Properties section of your provisioning application. For e.g. if you want to export your *Workday to AD User Provisioning application* mapping navigate to the Properties section of that app.
28-
1. In the Properties section of your provisioning app, copy the GUID value associated with the *Object ID* field. This value is also called the **ServicePrincipalId** of your App and it will be used in Graph Explorer operations.
27+
1. Launch the [Azure portal](https://portal.azure.com), and navigate to the Properties section of your provisioning application. For example, if you want to export your *Workday to AD User Provisioning application* mapping navigate to the Properties section of that app.
28+
1. In the Properties section of your provisioning app, copy the GUID value associated with the *Object ID* field. This value is also called the **ServicePrincipalId** of your app and it's used in Graph Explorer operations.
2929

3030
![Screenshot of Workday App Service Principal ID.](./media/skip-out-of-scope-deletions/wd_export_01.png)
3131

@@ -36,7 +36,7 @@ Because this configuration is widely used with the *Workday to Active Directory
3636

3737
![Screenshot of Microsoft Graph Explorer Sign-in.](./media/skip-out-of-scope-deletions/wd_export_02.png)
3838

39-
1. Upon successful sign-in, you'll see the user account details in the left-hand pane.
39+
1. Upon successful sign-in, the user account details appear in the left-hand pane.
4040

4141
## Step 3: Get existing app credentials and connectivity details
4242

@@ -48,7 +48,7 @@ In the Microsoft Graph Explorer, run the following GET query replacing [serviceP
4848

4949
![Screenshot of GET job query.](./media/skip-out-of-scope-deletions/skip-03.png)
5050

51-
Copy the Response into a text file. It will look like the JSON text shown below, with values highlighted in yellow specific to your deployment. Add the lines highlighted in green to the end and update the Workday connection password highlighted in blue.
51+
Copy the Response into a text file. It looks like the JSON text shown, with values highlighted in yellow specific to your deployment. Add the lines highlighted in green to the end and update the Workday connection password highlighted in blue.
5252

5353
![Screenshot of GET job response.](./media/skip-out-of-scope-deletions/skip-04.png)
5454

@@ -63,9 +63,9 @@ Here's the JSON block to add to the mapping.
6363

6464
## Step 4: Update the secrets endpoint with the SkipOutOfScopeDeletions flag
6565

66-
In the Graph Explorer, run the command below to update the secrets endpoint with the ***SkipOutOfScopeDeletions*** flag.
66+
In the Graph Explorer, run the command to update the secrets endpoint with the ***SkipOutOfScopeDeletions*** flag.
6767

68-
In the URL below replace [servicePrincipalId] with the **ServicePrincipalId** extracted from the [Step 1](#step-1-retrieve-your-provisioning-app-service-principal-id-object-id).
68+
In the URL, replace [servicePrincipalId] with the **ServicePrincipalId** extracted from the [Step 1](#step-1-retrieve-your-provisioning-app-service-principal-id-object-id).
6969

7070
```http
7171
PUT https://graph.microsoft.com/beta/servicePrincipals/[servicePrincipalId]/synchronization/secrets
@@ -82,11 +82,11 @@ You should get the output as "Success – Status Code 204". If you receive an er
8282

8383
## Step 5: Verify that out of scope users don’t get disabled
8484

85-
You can test this flag results in expected behavior by updating your scoping rules to skip a specific user. In the example below, we're excluding the employee with ID 21173 (who was earlier in scope) by adding a new scoping rule:
85+
You can test this flag results in expected behavior by updating your scoping rules to skip a specific user. In the example, we're excluding the employee with ID 21173 (who was earlier in scope) by adding a new scoping rule:
8686

8787
![Screenshot that shows the "Add Scoping Filter" section with an example user highlighted.](./media/skip-out-of-scope-deletions/skip-07.png)
8888

89-
In the next provisioning cycle, the Azure AD provisioning service will identify that the user 21173 has gone out of scope and if the SkipOutOfScopeDeletions property is enabled, then the synchronization rule for that user will display a message as shown below:
89+
In the next provisioning cycle, the Azure AD provisioning service identifies that the user 21173 has gone out of scope. If the `SkipOutOfScopeDeletions` property is enabled, then the synchronization rule for that user displays a message as shown:
9090

9191
![Screenshot of scoping example.](./media/skip-out-of-scope-deletions/skip-08.png)
9292

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ ms.collection: M365-identity-device-management
1616

1717
# Customer intent: As an identity administrator, I want to understand how to use phone authentication methods in Azure AD to improve and secure user sign-in events.
1818
---
19+
1920
# Authentication methods in Azure Active Directory - phone options
2021

2122
For direct authentication using text message, you can [Configure and enable users for SMS-based authentication](howto-authentication-sms-signin.md). SMS-based sign-in is great for Frontline workers. With SMS-based sign-in, users don't need to know a username and password to access applications and services. The user instead enters their registered mobile phone number, receives a text message with a verification code, and enters that in the sign-in interface.
@@ -84,6 +85,12 @@ If you have problems with phone authentication for Azure AD, review the followin
8485
* Have the user attempt to log in using a wi-fi connection by installing the Authenticator app.
8586
* Or, use SMS authentication instead of phone (voice) authentication.
8687

88+
* Phone number is blocked and unable to be used for Voice MFA
89+
90+
- There are a few country codes blocked for voice MFA unless your Azure AD administrator has opted in for those country codes. Have your Azure AD administrator opt-in to receive MFA for those country codes.
91+
92+
- Or, use Microsoft Authenticator instead of voice authentication.
93+
8794
## Next steps
8895

8996
To get started, see the [tutorial for self-service password reset (SSPR)][tutorial-sspr] and [Azure AD Multi-Factor Authentication][tutorial-azure-mfa].
@@ -96,6 +103,11 @@ Learn more about configuring authentication methods using the [Microsoft Graph R
96103

97104
<!-- INTERNAL LINKS -->
98105
[tutorial-sspr]: tutorial-enable-sspr.md
106+
99107
[tutorial-azure-mfa]: tutorial-enable-azure-mfa.md
108+
100109
[concept-sspr]: concept-sspr-howitworks.md
110+
101111
[concept-mfa]: concept-mfa-howitworks.md
112+
113+

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,7 @@ Combined registration supports the authentication methods and actions in the fol
5050
| FIDO2 security keys*| Yes | No | Yes |
5151

5252
> [!NOTE]
53+
> <b>Microsoft Authenticator</b> if the authentication mode set in policy for Microsoft Authenticator is passwordless, users will need to enable passwordless sign-in from within the Microsoft Authenticator app. Learn more on [user regsitration of passwordless phone sign-in here.](../authentication/howto-authentication-passwordless-phone.md#user-registration). <br />
5354
> <b>Alternate phone</b> can only be registered in *manage mode* on the [Security info](https://mysignins.microsoft.com/security-info) page and requires Voice calls to be enabled in the Authentication methods policy. <br />
5455
> <b>Office phone</b> can only be registered in *Interrupt mode* if the users *Business phone* property has been set. Office phone can be added by users in *Managed mode from the [Security info](https://mysignins.microsoft.com/security-info)* without this requirement. <br />
5556
> <b>App passwords</b> are available only to users who have been enforced for per-user MFA. App passwords aren't available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy. <br />

0 commit comments

Comments
 (0)