Skip to content

Commit b2245ac

Browse files
authored
Merge pull request #221545 from MicrosoftDocs/main
12/14 PM Publish
2 parents 9f05dd7 + 28b56a3 commit b2245ac

File tree

115 files changed

+1395
-978
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

115 files changed

+1395
-978
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5532,6 +5532,11 @@
55325532
"redirect_url": "/azure/azure-monitor/app/export-telemetry",
55335533
"redirect_document_id": false
55345534
},
5535+
{
5536+
"source_path_from_root": "/articles/azure-monitor/app/auto-collect-dependencies.md",
5537+
"redirect_url": "/azure/azure-monitor/app/asp-net-dependencies",
5538+
"redirect_document_id": false
5539+
},
55355540
{
55365541
"source_path_from_root": "/articles/azure-monitor/app/custom-endpoints.md",
55375542
"redirect_url": "/azure/azure-monitor/app/create-new-resource",

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 46 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 11/23/2022
7+
ms.date: 12/14/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -47,29 +47,34 @@ When a user responds to an MFA push notification using the Authenticator app, th
4747

4848
### SSPR
4949

50-
During self-service password reset, the Authenticator app notification will show a number that the user will need to type in their Authenticator app notification. This number will only be seen to users who have been enabled for number matching.
50+
Self-service password reset (SSPR) with Microsoft Authenticator will require number matching when using Microsoft Authenticator. During self-service password reset, the sign-in page will show a number that the user will need to type into the Microsoft Authenticator notification. This number will only be seen by users who are enabled for number matching.
5151

5252
### Combined registration
5353

54-
When a user goes through combined registration to set up the Authenticator app, the user is asked to approve a notification as part of adding the account. For users who are enabled for number matching, this notification will show a number that they need to type in their Authenticator app notification.
54+
Combined registration with Microsoft Authenticator will require number matching. When a user goes through combined registration to set up the Authenticator app, the user is asked to approve a notification as part of adding the account. For users who are enabled for number matching, this notification will show a number that they need to type in their Authenticator app notification.
5555

5656
### AD FS adapter
5757

58-
The AD FS adapter supports number matching after installing an update. Unpatched versions of Windows Server don't support number matching. Users will continue to see the **Approve**/**Deny** experience and won't see number matching unless these updates are applied.
58+
AD FS adapter will require number matching on supported versions of Windows Server. On earlier versions, users will continue to see the **Approve**/**Deny** experience and won’t see number matching until you upgrade. The AD FS adapter supports number matching only after installing one of the updates in the following table.
59+
60+
>[!NOTE]
61+
>Unpatched versions of Windows Server don't support number matching. Users will continue to see the **Approve**/**Deny** experience and won't see number matching unless these updates are applied.
5962
6063
| Version | Update |
6164
|---------|--------|
6265
| Windows Server 2022 | [November 9, 2021—KB5007205 (OS Build 20348.350)](https://support.microsoft.com/topic/november-9-2021-kb5007205-os-build-20348-350-af102e6f-cc7c-4cd4-8dc2-8b08d73d2b31) |
6366
| Windows Server 2019 | [November 9, 2021—KB5007206 (OS Build 17763.2300)](https://support.microsoft.com/topic/november-9-2021-kb5007206-os-build-17763-2300-c63b76fa-a9b4-4685-b17c-7d866bb50e48) |
6467

65-
6668
### NPS extension
6769

68-
Make sure you run the latest version of the [NPS extension](https://www.microsoft.com/download/details.aspx?id=54688). NPS extension versions beginning with 1.0.1.40 support number matching.
70+
Make sure you run the latest version of the [NPS extension](https://www.microsoft.com/download/details.aspx?id=54688). Until February 27, 2023, users are asked to enter a One-Time Passcode (OTP) for push notifications beginning with NPS extension 1.2.2131.2 _only_ if number matching is enabled. After February 27, 2023, number matching will be enabled by default and all users with push notifications beginning with NPS extension 1.2.2131.2 will be asked to enter an OTP.
6971

70-
Because the NPS extension can't show a number, a user who is enabled for number matching will still be prompted to **Approve**/**Deny**. However, you can create a registry key that overrides push notifications to ask a user to enter a One-Time Passcode (OTP). The user must have an OTP authentication method registered to see this behavior. Common OTP authentication methods include the OTP available in the Authenticator app, other software tokens, and so on.
72+
The user must have an OTP authentication method registered to see this behavior. Common OTP authentication methods include the OTP available in Microsoft Authenticator, other software tokens, and so on. For OTP to work, the VPN needs to use PAP protocol. For more information, see [Determine which authentication methods your users can use](howto-mfa-nps-extension.md#determine-which-authentication-methods-your-users-can-use).
7173

72-
If the user doesn't have an OTP method registered, they'll continue to get the **Approve**/**Deny** experience. A user with number matching disabled will always see the **Approve**/**Deny** experience.
74+
>[!NOTE]
75+
>If the user doesn't have an OTP method registered, they'll continue to get the **Approve**/**Deny** experience. A user who can't use an OTP will always see the **Approve**/**Deny** experience with push notifications triggered by a legacy NPS extension.
76+
77+
Earlier versions of the NPS extension beginning with 1.0.1.40 also support number matching, but you need to create a registry key that overrides push notifications to ask a user to enter an OTP. If you don't create the registry key, or you run a version prior to 1.0.1.40, users who are enabled for number matching will be prompted to **Approve**/**Deny**.
7378

7479
To create the registry key that overrides push notifications:
7580

@@ -80,12 +85,18 @@ To create the registry key that overrides push notifications:
8085
Value = TRUE
8186
1. Restart the NPS Service.
8287

88+
If you're using Remote Desktop Gateway, the user account must be configured for phone verification, or Microsoft Authenticator push notifications. If neither option is configured, the user won't be able to meet the Azure AD MFA challenge, and Remote Desktop Gateway sign-in will fail. In this case, you can set OVERRIDE_NUMBER_MATCHING_WITH_OTP = FALSE.
89+
90+
### Apple Watch supported for Microsoft Authenticator
91+
92+
In the upcoming Microsoft Authenticator release in January 2023 for iOS, there will be no companion app for watchOS due to it being incompatible with Authenticator security features. You won't be able to install or use Microsoft Authenticator on Apple Watch. We therefore recommend that you [delete Microsoft Authenticator from your Apple Watch](https://support.apple.com/HT212064), and sign in with Microsoft Authenticator on another device.
93+
8394
## Enable number matching in the portal
8495

8596
To enable number matching in the Azure AD portal, complete the following steps:
8697

8798
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
88-
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone or add selected users and groups. Set the **Authentication mode** for these users/groups to **Any**/**Push**.
99+
1. On the **Enable and Target** tab, click **Yes** and **All users** to enable the policy for everyone or add selected users and groups. Set the **Authentication mode** for these users/groups to **Any** or **Push**.
89100

90101
Only users who are enabled for Microsoft Authenticator here can be included in the policy to require number matching for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature.
91102

@@ -226,6 +237,7 @@ GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationM
226237

227238
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
228239
Inside the **includeTarget**, you'll need to change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
240+
To remove an excluded group from number matching, change the **id** of the **excludeTarget** to `00000000-0000-0000-0000-000000000000`.
229241

230242
You need to PATCH the entire configuration to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **numberMatchingRequiredState**.
231243

@@ -268,51 +280,18 @@ To verify, run GET again and verify the ObjectID:
268280
GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
269281
```
270282

271-
### Example of removing the excluded group from number matching
283+
## FAQs
272284

273-
In **featureSettings**, you'll need to change the **numberMatchingRequiredState** value from **default** to **enabled.**
274-
You need to change the **id** of the **excludeTarget** to `00000000-0000-0000-0000-000000000000`.
285+
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?
275286

276-
You need to PATCH the entire configuration to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **numberMatchingRequiredState**.
287+
Number match will be enabled for all users of Microsoft Authenticator after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
277288

278-
Only users who are enabled for Microsoft Authenticator under Microsoft Authenticator’s **includeTargets** will be excluded from the number match requirement. Users who aren't enabled for Microsoft Authenticator won't see the feature.
289+
### Will the changes on February 27th, 2023, override number matching settings that are configured for a group?
279290

280-
```json
281-
{
282-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
283-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
284-
"id": "MicrosoftAuthenticator",
285-
"state": "enabled",
286-
"featureSettings": {
287-
"numberMatchingRequiredState": {
288-
"state": "enabled",
289-
"includeTarget": {
290-
"targetType": "group",
291-
"id": "1ca44590-e896-4dbe-98ed-b140b1e7a53a"
292-
},
293-
"excludeTarget": {
294-
"targetType": "group",
295-
"id": " 00000000-0000-0000-0000-000000000000"
296-
}
297-
}
298-
},
299-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
300-
"includeTargets": [
301-
{
302-
"targetType": "group",
303-
"id": "all_users",
304-
"isRegistrationRequired": false,
305-
"authenticationMode": "any"
306-
}
307-
]
308-
}
309-
```
291+
The **Enable and Target** tab of the Microsoft Authenticator authentication method policy will remain unchanged. Admins can continue to Target specific users and groups or All Users for Push or Any notifications. This change will only impact members of users and groups that are Targeted on the **Enable and Target** tab for Push and/or Any.
310292

311-
## FAQs
312-
313-
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?
293+
When Microsoft begins protecting all organizations by enabling number matching on February 27th, 2023, administrators will see the **Require number matching for push notifications** setting on the **Configure** tab of the Microsoft Authenticator policy is set to **Enabled** for **All users** and can't be disabled. In addition, the **Exclude** option for this setting will be removed.
314294

315-
Number match will be enabled for all users of Microsoft Authenticator after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
316295

317296
### How should users be prepared for default number matching?
318297

@@ -334,9 +313,27 @@ Here are differences in sign-in scenarios that Microsoft Authenticator users wil
334313

335314
- Apple Watch will remain unsupported for number matching. We recommend you uninstall the Microsoft Authenticator Apple Watch app because you have to approve notifications on your phone.
336315

316+
### How can users enter an OTP with the NPS extension?
317+
318+
The VPN and NPS server must be using PAP protocol for OTP prompts to appear. If they're using a protocol that doesn't support OTP, such as MSCHAPv2, they'll continue to see the **Approve/Deny** notifications.
319+
320+
### Will users get a prompt similar to a number matching prompt, but will need to enter an OTP?
321+
322+
They'll see a prompt to supply a verification code. They must select their account in Microsoft Authenticator and enter the random generated code that appears there.
323+
337324
### Can I opt out of number matching?
338325

339-
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants by Feb 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
326+
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants by February 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
327+
328+
### Does number matching only apply if Microsoft Authenticator is set as the default authentication method?
329+
330+
If the user has a different default authentication method, there won't be any change to their default sign-in. If the default method is Microsoft Authenticator and they are members of groups targeted for **Push** or **Any** on the **Enable and Target** tab, they'll start to receive number matching approval on February 27th, 2023.
331+
332+
Regardless of their default method, any user who is prompted to sign-in with Authenticator will see number match after February 27th, 2023. If the user is prompted for another method, they won't see any change.
333+
334+
### Will users who don't use number matching be able to perform MFA?
335+
336+
It depends on how the **Enable and Target** tab is configured. The scope for number match approvals will change under the **Configure** tab to include everyone, but it only applies for users and groups targeted on the **Enable and Target** tab for Push or Any. However, if Target on the **Enable and Target** tab is set to specific groups for Push or Any, and the user isn't a member of those groups, then they won't receive the number matching approvals once the change is implemented on February 27th, 2023 because they aren't a member of the groups defined on the **Enable and Target** tab for Push and/or Any.
340337

341338
### What happens if a user runs an older version of Microsoft Authenticator?
342339

0 Bytes
Loading
0 Bytes
Loading

articles/active-directory/conditional-access/concept-conditional-access-policy-common.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Conditional Access templates provide a convenient method to deploy new policies
2121

2222
:::image type="content" source="media/concept-conditional-access-policy-common/conditional-access-policies-azure-ad-listing.png" alt-text="Conditional Access policies and templates in the Azure portal." lightbox="media/concept-conditional-access-policy-common/conditional-access-policies-azure-ad-listing.png":::
2323

24-
There are 14 Conditional Access policy templates, filtered by six different scenarios:
24+
There are 14 Conditional Access policy templates, filtered by five different scenarios:
2525

2626
- Secure foundation
2727
- Zero Trust

articles/active-directory/develop/msal-js-sso.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -78,13 +78,13 @@ const request = {
7878

7979
#### Using a login hint
8080

81-
To bypass the account selection prompt typically shown during interactive authentication requests (or for silent requests when you haven't configured the `sid` optional claim), provide a `loginHint`. In multi-tenant applications, also include a `domain_hint`.
81+
To bypass the account selection prompt typically shown during interactive authentication requests (or for silent requests when you haven't configured the `sid` optional claim), provide a `loginHint`. In multi-tenant applications, also include a `domainHint`.
8282

8383
```javascript
8484
const request = {
8585
scopes: ["user.read"],
86-
loginHint: preferred_username,
87-
extraQueryParameters: { domain_hint: "organizations" },
86+
loginHint: "preferred_username",
87+
domainHint: "preferred_tenant_id"
8888
};
8989

9090
try {
@@ -100,11 +100,11 @@ try {
100100
}
101101
```
102102

103-
Get the values for `loginHint` and `domain_hint` from the user's **ID token**:
103+
Get the values for `loginHint` and `domainHint` from the user's **ID token**:
104104

105105
- `loginHint`: Use the ID token's `preferred_username` claim value.
106106

107-
- `domain_hint`: Use the ID token's `tid` claim value. Required in requests made by multi-tenant applications that use the */common* authority. Optional for other applications.
107+
- `domainHint`: Use the ID token's `tid` claim value. Required in requests made by multi-tenant applications that use the */common* authority. Optional for other applications.
108108

109109
For more information about login hint and domain hint, see [Microsoft identity platform and OAuth 2.0 authorization code flow](v2-oauth2-auth-code-flow.md).
110110

0 commit comments

Comments
 (0)