Skip to content

Commit ad58304

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents c6ec748 + 7134399 commit ad58304

File tree

139 files changed

+2119
-2805
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

139 files changed

+2119
-2805
lines changed

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 21 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: how-to
10-
ms.date: 07/15/2022
10+
ms.date: 07/19/2022
1111

1212

1313
ms.author: justinha
@@ -24,21 +24,38 @@ Microsoft Authenticator can be used to sign in to any Azure AD account without u
2424

2525
This authentication technology can be used on any device platform, including mobile. This technology can also be used with any app or website that integrates with Microsoft Authentication Libraries.
2626

27-
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app.png" alt-text="Screenshot that shows an example of a browser sign-in asking for the user to approve the sign-in.":::
27+
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/phone-sign-in-microsoft-authenticator-app-next.png" alt-text="Screenshot that shows an example of a browser sign-in asking for the user to approve the sign-in.":::
2828

2929
People who enabled phone sign-in from Microsoft Authenticator see a message that asks them to tap a number in their app. No username or password is asked for. To complete the sign-in process in the app, a user must next take the following actions:
3030

3131
1. Enter the number they see on the login screen into Microsoft Authenticator dialog.
3232
1. Choose **Approve**.
3333
1. Provide their PIN or biometric.
3434

35+
## Multiple accounts on iOS (preview)
36+
37+
You can enable passwordless phone sign-in for multiple accounts in Microsoft Authenticator on any supported iOS device. Consultants, students, and others with multiple accounts in Azure AD can add each account to Microsoft Authenticator and use passwordless phone sign-in for all of them from the same iOS device.
38+
39+
Previously, admins might not require passwordless sign-in for users with multiple accounts because it requires them to carry more devices for sign-in. By removing the limitation of one user sign-in from a device, admins can more confidently encourage users to register passwordless phone sign-in and use it as their default sign-in method.
40+
41+
The Azure AD accounts can be in the same tenant or different tenants. Guest accounts aren't supported for multiple account sign-in from one device.
42+
43+
>[!NOTE]
44+
>Multiple accounts on iOS is currently in public preview. Some features might not be supported or have limited capabilities. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
45+
3546
## Prerequisites
3647

3748
To use passwordless phone sign-in with Microsoft Authenticator, the following prerequisites must be met:
3849

3950
- Recommended: Azure AD Multi-Factor Authentication, with push notifications allowed as a verification method. Push notifications to your smartphone or tablet help the Authenticator app to prevent unauthorized access to accounts and stop fraudulent transactions. The Authenticator app automatically generates codes when set up to do push notifications so a user has a backup sign-in method even if their device doesn't have connectivity.
4051
- Latest version of Microsoft Authenticator installed on devices running iOS 12.0 or greater, or Android 6.0 or greater.
41-
- The device that runs Microsoft Authenticator must be registered to an individual user. We're actively working to enable multiple accounts on Android.
52+
- For Android, the device that runs Microsoft Authenticator must be registered to an individual user. We're actively working to enable multiple accounts on Android.
53+
- For iOS, the device must be registered with each tenant where it's used to sign in. For example, the following device must be registered with Contoso and Wingtiptoys to allow all accounts to sign in:
54+
55+
- [email protected] and bsandhu@wingtiptoys
56+
- For iOS, we recommend enabling the option in Microsoft Authenticator to allow Microsoft to gather usage data. It's not enabled by default. To enable it in Microsoft Authenticator, go to **Settings** > **Usage Data**.
57+
58+
:::image type="content" border="true" source="./media/howto-authentication-passwordless-phone/telemetry.png" alt-text="Screenshot of Usage Data in Microsoft Authenticator.":::
4259

4360
To use passwordless authentication in Azure AD, first enable the combined registration experience, then enable users for the passwordless method.
4461

@@ -128,19 +145,11 @@ An end user can be enabled for multifactor authentication (MFA) through an on-pr
128145

129146
If the user attempts to upgrade multiple installations (5+) of Microsoft Authenticator with the passwordless phone sign-in credential, this change might result in an error.
130147

131-
### Device registration
132-
133-
Before you can create this new strong credential, there are prerequisites. One prerequisite is that the device on which Microsoft Authenticator is installed must be registered within the Azure AD tenant to an individual user.
134-
135-
Currently, a device can only be enabled for passwordless sign-in in a single tenant. This limit means that only one work or school account in Microsoft Authenticator can be enabled for phone sign-in.
136-
137-
> [!NOTE]
138-
> Device registration is not the same as device management or mobile device management (MDM). Device registration only associates a device ID and a user ID together, in the Azure AD directory.
139148

140149
## Next steps
141150

142151
To learn about Azure AD authentication and passwordless methods, see the following articles:
143152

144153
- [Learn how passwordless authentication works](concept-authentication-passwordless.md)
145154
- [Learn about device registration](../devices/overview.md)
146-
- [Learn about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)
155+
- [Learn about Azure AD Multi-Factor Authentication](../authentication/howto-mfa-getstarted.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
Accounts that are assigned administrative rights are targeted by attackers. Requiring multi-factor authentication (MFA) on those accounts is an easy way to reduce the risk of those accounts being compromised.
2121

22-
Microsoft recommends you require MFA on the following roles at a minimum:
22+
Microsoft recommends you require MFA on the following roles at a minimum, based on [identity score recommendations](../fundamentals/identity-secure-score.md):
2323

2424
- Global administrator
2525
- Application administrator

articles/active-directory/fundamentals/road-to-the-cloud-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: references_regions
1414

1515
# Introduction
1616

17-
This content provides guidance to move:
17+
Some organizations set goals to remove AD, and their on-premises IT footprint. Others take advantage of some cloud-based capabilities to reduce the AD footprint, but not to completely remove their on-premises environments. This content provides guidance to move:
1818

1919
* **From** - Active Directory (AD) and other non-cloud based services, either hosted on-premises or Infrastructure-as-a-Service (IaaS), that provide identity management (IDM), identity and access management (IAM) and device management.
2020

@@ -23,7 +23,7 @@ This content provides guidance to move:
2323
>[!NOTE]
2424
> In this content, when we refer to AD, we are referring to Windows Server Active Directory Domain Services.
2525
26-
Some organizations set goals to remove AD, and their on-premises IT footprint. Others set goals to take advantage of some cloud-based capabilities, but not to completely remove their on-premises or IaaS environments. Transformation must be aligned with and achieve business objectives including increased productivity, reduced costs and complexity, and improved security posture. To better understand the costs vs. value of moving to the cloud, see [Forrester TEI for Microsoft Azure Active Directory](https://www.microsoft.com/security/business/forrester-tei-study) and other TEI reports and [Cloud economics](https://azure.microsoft.com/overview/cloud-economics/).
26+
Transformation must be aligned with and achieve business objectives including increased productivity, reduced costs and complexity, and improved security posture. To better understand the costs vs. value of moving to the cloud, see [Forrester TEI for Microsoft Azure Active Directory](https://www.microsoft.com/security/business/forrester-tei-study) and other TEI reports and [Cloud economics](https://azure.microsoft.com/overview/cloud-economics/).
2727

2828
## Next steps
2929

articles/active-directory/governance/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@
5656
- name: Manage users excluded from Conditional Access
5757
href: conditional-access-exclusion.md
5858
- name: Review recommendations for group access reviews
59-
hreg: peer-outlier-access-reviews.md
59+
href: review-recommendations-group-access-reviews.md
6060
- name: Review and remove users from external organizations
6161
href: access-reviews-external-users.md
6262
- name: How-to guides

articles/active-directory/governance/review-recommendations-group-access-reviews.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Review access with review recommendations - Azure AD
2+
title: Review recommendations for Access reviews - Azure AD
33
description: Learn how to review access of group members with review recommendations in Azure Active Directory access reviews.
44
services: active-directory
55
author: ajburnle
@@ -16,7 +16,7 @@ ms.reviewer: mwahl
1616
ms.collection: M365-identity-device-management
1717
---
1818

19-
# Review recommendations for group access reviews
19+
# Review recommendations for Access reviews
2020

2121
Decision makers who review users' access and perform access reviews can use system based recommendations to help them decide whether to continue their access or deny their access to resources. For more information about how to use review recommendations, see [Enable decision helpers](create-access-review.md#next-settings).
2222

articles/aks/web-app-routing.md

Lines changed: 33 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,10 @@ The Web Application Routing solution makes it easy to access applications that a
2020

2121
## Web Application Routing solution overview
2222

23-
The add-on deploys four components: an [nginx ingress controller][nginx], [Secrets Store CSI Driver][csi-driver], [Open Service Mesh (OSM)][osm], and [External-DNS][external-dns] controller.
23+
The add-on deploys two components: an [nginx ingress controller][nginx], and [External-DNS][external-dns] controller.
2424

2525
- **Nginx ingress Controller**: The ingress controller exposed to the internet.
2626
- **External-DNS controller**: Watches for Kubernetes Ingress resources and creates DNS A records in the cluster-specific DNS zone.
27-
- **CSI driver**: Connector used to communicate with keyvault to retrieve SSL certificates for ingress controller.
28-
- **OSM**: A lightweight, extensible, cloud native service mesh that allows users to uniformly manage, secure, and get out-of-the-box observability features for highly dynamic microservice environments.
2927

3028
## Prerequisites
3129

@@ -48,23 +46,31 @@ az extension update --name aks-preview
4846

4947
### Install the `osm` CLI
5048

51-
Since Web Application Routing uses OSM internally to secure intranet communication, we need to set up the `osm` CLI. This command-line tool contains everything needed to install and configure Open Service Mesh. The binary is available on the [OSM GitHub releases page][osm-release].
49+
Since Web Application Routing uses OSM internally to secure intranet communication, we need to set up the `osm` CLI. This command-line tool contains everything needed to configure and manage Open Service Mesh. The latest binaries are available on the [OSM GitHub releases page][osm-release].
5250

53-
## Deploy Web Application Routing with the Azure CLI
51+
### Import certificate to Azure Keyvault
5452

55-
The Web Application Routing routing add-on can be enabled with the Azure CLI when deploying an AKS cluster. To do so, use the [az aks create][az-aks-create] command with the `--enable-addons` argument.
53+
```bash
54+
openssl pkcs12 -export -in aks-ingress-tls.crt -inkey aks-ingress-tls.key -out aks-ingress-tls.pfx
55+
# skip Password prompt
56+
```
5657

5758
```azurecli
58-
az aks create --resource-group myResourceGroup --name myAKSCluster --enable-addons web_application_routing
59+
az keyvault certificate import --vault-name <MY_KEYVAULT> -n <KEYVAULT-CERTIFICATE-NAME> -f aks-ingress-tls.pfx
5960
```
6061

61-
> [!TIP]
62-
> If you want to enable multiple add-ons, provide them as a comma-separated list. For example, to enable Web Application Routing routing and monitoring, use the format `--enable-addons web_application_routing,monitoring`.
62+
## Deploy Web Application Routing with the Azure CLI
63+
64+
The Web Application Routing routing add-on can be enabled with the Azure CLI when deploying an AKS cluster. To do so, use the [az aks create][az-aks-create] command with the `--enable-addons` argument. However, since Web Application routing depends on the OSM addon to secure intranet communication and the Azure Keyvault Secret Provider to retrieve certificates, we must enable them at the same time.
65+
66+
```azurecli
67+
az aks create --resource-group myResourceGroup --name myAKSCluster --enable-addons azure-keyvault-secrets-provider,open-service-mesh,web_application_routing --generate-ssh-keys
68+
```
6369

6470
You can also enable Web Application Routing on an existing AKS cluster using the [az aks enable-addons][az-aks-enable-addons] command. To enable Web Application Routing on an existing cluster, add the `--addons` parameter and specify *web_application_routing* as shown in the following example:
6571

6672
```azurecli
67-
az aks enable-addons --resource-group myResourceGroup --name myAKSCluster --addons web_application_routing
73+
az aks enable-addons --resource-group myResourceGroup --name myAKSCluster --addons azure-keyvault-secrets-provider,open-service-mesh,web_application_routing
6874
```
6975

7076
## Connect to your AKS cluster
@@ -109,16 +115,10 @@ Copy the identity's object ID:
109115

110116
### Grant access to Azure Key Vault
111117

112-
Obtain the vault URI for your Azure Key Vault:
113-
114-
```azurecli
115-
az keyvault show --resource-group myResourceGroup --name myapp-contoso
116-
```
117-
118118
Grant `GET` permissions for Web Application Routing to retrieve certificates from Azure Key Vault:
119119

120120
```azurecli
121-
az keyvault set-policy --name myapp-contoso --object-id <WEB_APP_ROUTING_MSI_OBJECT_ID> --secret-permissions get --certificate-permissions get
121+
az keyvault set-policy --name myapp-contoso --object-id <WEB_APP_ROUTING_MSI_OBJECT_ID> --secret-permissions get --certificate-permissions get
122122
```
123123

124124
## Use Web Application Routing
@@ -128,12 +128,16 @@ The Web Application Routing solution may only be triggered on service resources
128128
```yaml
129129
annotations:
130130
kubernetes.azure.com/ingress-host: myapp.contoso.com
131-
kubernetes.azure.com/tls-cert-keyvault-uri: myapp-contoso.vault.azure.net/certificates/keyvault-certificate-name/keyvault-certificate-name-revision
131+
kubernetes.azure.com/tls-cert-keyvault-uri: https://<MY-KEYVAULT>.vault.azure.net/certificates/<KEYVAULT-CERTIFICATE-NAME>/<KEYVAULT-CERTIFICATE-REVISION>
132132
```
133133
134-
These annotations in the service manifest would direct Web Application Routing to create an ingress servicing `myapp.contoso.com` connected to the keyvault `myapp-contoso` and will retrieve the `keyvault-certificate-name` with `keyvault-certificate-name-revision`
134+
These annotations in the service manifest would direct Web Application Routing to create an ingress servicing `myapp.contoso.com` connected to the keyvault `<MY-KEYVAULT>` and will retrieve the `<KEYVAULT-CERTIFICATE-NAME>` with `<KEYVAULT-CERTIFICATE-REVISION>`. To obtain the certificate URI within your keyvault run:
135+
136+
```azurecli
137+
az keyvault certificate show --vault-name <MY_KEYVAULT> --name <KEYVAULT-CERTIFICATE-NAME> -o jsonc | jq .id
138+
```
135139

136-
Create a file named **samples-web-app-routing.yaml** and copy in the following YAML. On line 29-31, update `<MY_HOSTNAME>` with your DNS host name and `<MY_KEYVAULT_URI>` with the full certficicate vault URI.
140+
Create a file named **samples-web-app-routing.yaml** and copy in the following YAML. On line 29-31, update `<MY_HOSTNAME>` with your DNS host name and `<MY_KEYVAULT_CERTIFICATE_URI>` with the ID returned from keyvault.
137141

138142
```yaml
139143
apiVersion: apps/v1
@@ -165,7 +169,7 @@ metadata:
165169
name: aks-helloworld
166170
annotations:
167171
kubernetes.azure.com/ingress-host: <MY_HOSTNAME>
168-
kubernetes.azure.com/tls-cert-keyvault-uri: <MY_KEYVAULT_URI>
172+
kubernetes.azure.com/tls-cert-keyvault-uri: <MY_KEYVAULT_CERTIFICATE_URI>
169173
spec:
170174
type: ClusterIP
171175
ports:
@@ -190,10 +194,15 @@ service/aks-helloworld created
190194
## Verify the managed ingress was created
191195

192196
```bash
193-
$ kubectl get ingress -n hello-web-app-routing
197+
kubectl get ingress -n hello-web-app-routing
198+
199+
NAME CLASS HOSTS ADDRESS PORTS AGE
200+
aks-helloworld webapprouting.kubernetes.azure.com myapp.contoso.com 20.51.92.19 80, 443 4m
194201
```
195202

196-
Open a web browser to *<MY_HOSTNAME>*, for example *myapp.contoso.com* and verify you see the demo application. The application may take a few minutes to appear.
203+
## Configure external DNS to point to cluster
204+
205+
Now that Web Application Routing is configured within our cluster and we have the external IP address, we can configure our DNS servers to reflect this. As soon as the DNS updates have propagated, open a web browser to *<MY_HOSTNAME>*, for example *myapp.contoso.com* and verify you see the demo application. The application may take a few minutes to appear.
197206

198207
## Remove Web Application Routing
199208

@@ -206,7 +215,7 @@ kubectl delete namespace hello-web-app-routing
206215
The Web Application Routing add-on can be removed using the Azure CLI. To do so run the following command, substituting your AKS cluster and resource group name.
207216

208217
```azurecli
209-
az aks disable-addons --addons web_application_routing --name myAKSCluster --resource-group myResourceGroup --no-wait
218+
az aks disable-addons --addons azure-keyvault-secrets-provider,open-service-mesh,web_application_routing --name myAKSCluster --resource-group myResourceGroup
210219
```
211220

212221
When the Web Application Routing add-on is disabled, some Kubernetes resources may remain in the cluster. These resources include *configMaps* and *secrets*, and are created in the *app-routing-system* namespace. To maintain a clean cluster, you may want to remove these resources.

0 commit comments

Comments
 (0)