Skip to content

Commit b55d7c8

Browse files
authored
Merge pull request #111624 from MicrosoftDocs/master
Merge Master to Live, 4 am
2 parents b80aafd + 6967aa6 commit b55d7c8

File tree

402 files changed

+1328
-1465
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

402 files changed

+1328
-1465
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -236,6 +236,11 @@
236236
"redirect_url": "/azure//virtual-machines/windows/sql/virtual-machines-windows-portal-sql-create-failover-cluster-premium-file-share",
237237
"redirect_document_id": false
238238
},
239+
{
240+
"source_path": "articles/virtual-machines/windows/encrypt-disks.md",
241+
"redirect_url": "/azure//virtual-machines/windows/disk-encryption-overview",
242+
"redirect_document_id": false
243+
},
239244
{
240245
"source_path": "articles/virtual-machines/linux/cli-manage-nodejs.md",
241246
"redirect_url": "/azure/virtual-machines/linux/create-cli-complete",
@@ -51114,6 +51119,16 @@
5111451119
"source_path": "articles/security/fundamentals/database-best-practices.md",
5111551120
"redirect_url": "/azure/sql-database/sql-database-security-best-practice",
5111651121
"redirect_document_id": false
51122+
},
51123+
{
51124+
"source_path": "articles/healthcare-apis/configure-azure-rbac.md",
51125+
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir-additional-settings",
51126+
"redirect_document_id": false
51127+
},
51128+
{
51129+
"source_path": "articles/healthcare-apis/configure-local-rbac.md",
51130+
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir-additional-settings",
51131+
"redirect_document_id": false
5111751132
}
5111851133
]
5111951134
}

articles/active-directory-b2c/identity-provider-adfs2016-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Now that you have a button in place, you need to link it to an action. The actio
165165
To use ADFS as an identity provider in Azure AD B2C, you need to create an ADFS Relying Party Trust with the Azure AD B2C SAML metadata. The following example shows a URL address to the SAML metadata of an Azure AD B2C technical profile:
166166

167167
```
168-
https://your-tenant-name.b2clogin.com/your-tenant-name/your-policy/samlp/metadata?idptp=your-technical-profile
168+
https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy/samlp/metadata?idptp=your-technical-profile
169169
```
170170
171171
Replace the following values:

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 14 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,39 @@
11
---
22
title: Combined registration for SSPR and MFA - Azure Active Directory
3-
description: Azure AD Multi-Factor Authentication and self-service password reset registration (preview)
3+
description: Azure AD Multi-Factor Authentication and self-service password reset registration
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 03/06/2020
9+
ms.date: 04/15/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
1313
manager: daveba
14-
ms.reviewer: sahenry
14+
ms.reviewer: rhicock
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Combined security information registration (preview)
18+
# Combined security information registration overview
1919

2020
Before combined registration, users registered authentication methods for Azure Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Multi-Factor Authentication and SSPR.
2121

22+
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
23+
24+
> [!div class="nextstepaction"]
25+
> [Enable combined security regiration](howto-registration-mfa-sspr-combined.md)
26+
2227
![My Profile showing registered Security info for a user](media/concept-registration-mfa-sspr-combined/combined-security-info-defualts-registered.png)
2328

2429
Before enabling the new experience, review this administrator-focused documentation and the user-focused documentation to ensure you understand the functionality and effect of this feature. Base your training on the [user documentation](../user-help/user-help-security-info-overview.md) to prepare your users for the new experience and help to ensure a successful rollout.
2530

2631
Azure AD combined security information registration is not currently available to national clouds like Azure US Government, Azure Germany, or Azure China 21Vianet.
2732

28-
| |
29-
| --- |
30-
| Combined security information registration for Multi-Factor Authentication and Azure Active Directory (Azure AD) self-service password reset is a public preview feature of Azure AD. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).|
31-
| |
32-
3333
> [!IMPORTANT]
3434
> Users who are enabled for both the original preview and the enhanced combined registration experience will see the new behavior. Users who are enabled for both experiences will see only the new My Profile experience. The new My Profile aligns with the look and feel of combined registration and provides a seamless experience for users. Users can see My Profile by going to [https://myprofile.microsoft.com](https://myprofile.microsoft.com).
35-
36-
> [!NOTE]
37-
> You might encounter an error message while trying to access the Security info option. For example, "Sorry, we can't sign you in". In this case, confirm that you don't have any configuration or group policy object that blocks third-party cookies on the web browser.
35+
>
36+
> You might encounter an error message while trying to access the Security info option. For example, "Sorry, we can't sign you in". In this case, confirm that you don't have any configuration or group policy object that blocks third-party cookies on the web browser.
3837
3938
My Profile pages are localized based on the language settings of the computer accessing the page. Microsoft stores the most recent language used in the browser cache, so subsequent attempts to access the pages will continue to render in the last language used. If you clear the cache, the pages will re-render. If you want to force a specific language, you can add `?lng=<language>` to the end of the URL, where `<language>` is the code of the language you want to render.
4039

@@ -74,7 +73,6 @@ As we continue to add more authentication methods to Azure AD, those methods wil
7473
There are two modes of combined registration: interrupt and manage.
7574

7675
- **Interrupt mode** is a wizard-like experience, presented to users when they register or refresh their security info at sign-in.
77-
7876
- **Manage mode** is part of the user profile and allows users to manage their security info.
7977

8078
For both modes, users who have previously registered a method that can be used for Multi-Factor Authentication will need to perform Multi-Factor Authentication before they can access their security info.
@@ -136,14 +134,8 @@ A user who has previously set up at least one method that can be used for Multi-
136134

137135
## Next steps
138136

139-
[Force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options)
140-
141-
[Enable combined registration in your tenant](howto-registration-mfa-sspr-combined.md)
142-
143-
[SSPR and MFA usage and insights reporting](howto-authentication-methods-usage-insights.md)
144-
145-
[Available methods for Multi-Factor Authentication and SSPR](concept-authentication-methods.md)
137+
To get started, see the tutorials to [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
146138

147-
[Configure self-service password reset](howto-sspr-deployment.md)
139+
Learn how to [enable combined registration in your tenant](howto-registration-mfa-sspr-combined.md) or [force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options).
148140

149-
[Configure Azure Multi-Factor Authentication](howto-mfa-getstarted.md)
141+
You can also review the [available methods for Azure Multi-Factor Authentication and SSPR](concept-authentication-methods.md).

articles/active-directory/authentication/howto-authentication-passwordless-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Organizations must meet the following prerequisites before beginning a passwordl
6464

6565
| Prerequisite | Authenticator app | FIDO2 Security Keys |
6666
| --- | --- | --- |
67-
| [Combined registration for Azure Multi-factor authentication and self-service password reset (SSPR)](howto-registration-mfa-sspr-combined.md) is enabled (preview feature) |||
67+
| [Combined registration for Azure Multi-factor authentication and self-service password reset (SSPR)](howto-registration-mfa-sspr-combined.md) is enabled |||
6868
| [Users can perform Azure Multi-factor authentication](howto-mfa-getstarted.md) |||
6969
| [Users have registered for Azure Multi-factor authentication and SSPR](howto-registration-mfa-sspr-combined.md) |||
7070
| [Users have registered their mobile devices to Azure Active Directory](../devices/overview.md) || |

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Instead of seeing a prompt for a password after entering a username, a person wh
3838

3939
### Enable the combined registration experience
4040

41-
Registration features for passwordless authentication methods rely on the combined registration preview. Follow the steps in the article [Enable combined security information registration (preview)](howto-registration-mfa-sspr-combined.md), to enable the combined registration preview.
41+
Registration features for passwordless authentication methods rely on the combined registration feature. Follow the steps in the article [Enable combined security information registration](howto-registration-mfa-sspr-combined.md), to enable combined registration.
4242

4343
### Enable passwordless phone sign-in authentication methods
4444

articles/active-directory/authentication/howto-authentication-passwordless-security-key.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Hybrid Azure AD joined devices must run Windows 10 Insider Build 18945 or newer.
4545

4646
### Enable the combined registration experience
4747

48-
Registration features for passwordless authentication methods rely on the combined registration preview. Follow the steps in the article [Enable combined security information registration (preview)](howto-registration-mfa-sspr-combined.md), to enable the combined registration preview.
48+
Registration features for passwordless authentication methods rely on the combined registration feature. Follow the steps in the article [Enable combined security information registration (preview)](howto-registration-mfa-sspr-combined.md), to enable combined registration.
4949

5050
### Enable FIDO2 security key method
5151

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ A text message that contains a verification code is sent to the user, the user i
141141

142142
## Plan registration policy
143143

144-
Administrators must determine how users will register their methods. Organizations should [enable the new combined registration experience](howto-registration-mfa-sspr-combined.md) for Azure MFA and self-service password reset (SSPR). SSPR allows users to reset their password in a secure way using the same methods they use for multi-factor authentication. We recommend this combined registration, currently in public preview, because it's a great experience for users, with the ability to register once for both services. Enabling the same methods for SSPR and Azure MFA will allow your users to be registered to use both features.
144+
Administrators must determine how users will register their methods. Organizations should [enable the new combined registration experience](howto-registration-mfa-sspr-combined.md) for Azure MFA and self-service password reset (SSPR). SSPR allows users to reset their password in a secure way using the same methods they use for multi-factor authentication. We recommend this combined registration because it's a great experience for users, with the ability to register once for both services. Enabling the same methods for SSPR and Azure MFA will allow your users to be registered to use both features.
145145

146146
### Registration with Identity Protection
147147

articles/active-directory/authentication/howto-registration-mfa-sspr-combined-troubleshoot.md

Lines changed: 12 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,24 @@
11
---
22
title: Troubleshoot combined registration - Azure Active Directory
3-
description: Troubleshoot Azure AD Multi-Factor Authentication and self-service password reset combined registration (preview)
3+
description: Troubleshoot Azure AD Multi-Factor Authentication and self-service password reset combined registration
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: troubleshooting
9-
ms.date: 11/21/2019
9+
ms.date: 04/15/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
1313
manager: daveba
14-
ms.reviewer: sahenry
14+
ms.reviewer: rhicock
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Troubleshooting combined security information registration (preview)
18+
# Troubleshooting combined security information registration
1919

2020
The information in this article is meant to guide admins who are troubleshooting issues reported by users of the combined registration experience.
2121

22-
| |
23-
| --- |
24-
| Combined security information registration for Azure Multi-Factor Authentication and Azure Active Directory (Azure AD) self-service password reset is a public preview feature of Azure AD. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).|
25-
| |
26-
2722
## Audit logs
2823

2924
The events logged for combined registration are in the Authentication Methods category in the Azure AD audit logs.
@@ -48,25 +43,25 @@ The following table lists all audit events generated by combined registration:
4843

4944
| Symptom | Troubleshooting steps |
5045
| --- | --- |
51-
| Im not seeing the methods I expected to see. | 1. Check if the user has an Azure AD admin role. If yes, view the SSPR admin policy differences. <br> 2. Determine whether the user is being interrupted because of Multi-Factor Authentication registration enforcement or SSPR registration enforcement. See the [flowchart](../../active-directory/authentication/concept-registration-mfa-sspr-combined.md#combined-registration-modes) under "Combined registration modes" to determine which methods should be shown. <br> 3. Determine how recently the Multi-Factor Authentication or SSPR policy was changed. If the change was recent, it might take some time for the updated policy to propagate.|
46+
| I'm not seeing the methods I expected to see. | 1. Check if the user has an Azure AD admin role. If yes, view the SSPR admin policy differences. <br> 2. Determine whether the user is being interrupted because of Multi-Factor Authentication registration enforcement or SSPR registration enforcement. See the [flowchart](../../active-directory/authentication/concept-registration-mfa-sspr-combined.md#combined-registration-modes) under "Combined registration modes" to determine which methods should be shown. <br> 3. Determine how recently the Multi-Factor Authentication or SSPR policy was changed. If the change was recent, it might take some time for the updated policy to propagate.|
5247

5348
## Troubleshooting manage mode
5449

5550
| Symptom | Troubleshooting steps |
5651
| --- | --- |
57-
| I dont have the option to add a particular method. | 1. Determine whether the method is enabled for Multi-Factor Authentication or for SSPR. <br> 2. If the method is enabled, save the policies again and wait 1-2 hours before testing again. <br> 3. If the method is enabled, ensure that the user hasnt already set up the maximum number of that method that they're allowed to set up.|
52+
| I don't have the option to add a particular method. | 1. Determine whether the method is enabled for Multi-Factor Authentication or for SSPR. <br> 2. If the method is enabled, save the policies again and wait 1-2 hours before testing again. <br> 3. If the method is enabled, ensure that the user hasn't already set up the maximum number of that method that they're allowed to set up.|
5853

5954
## Disable combined registration
6055

6156
When a user registers a phone number and/or mobile app in the new combined experience, our service stamps a set of flags (StrongAuthenticationMethods) for those methods on that user. This functionality allows the user to perform Multi-Factor Authentication with those methods whenever Multi-Factor Authentication is required.
6257

6358
If an admin enables the preview, users register through the new experience, and then the admin disables the preview, users might unknowingly be registered for Multi-Factor Authentication also.
6459

65-
If a user who has completed combined registration goes to the current self-service password reset (SSPR) registration page at [https://aka.ms/ssprsetup](https://aka.ms/ssprsetup), the user will be prompted to perform Multi-Factor Authentication before they can access that page. This step is expected from a technical standpoint, but it's new for users who were previously registered for SSPR only. Though this extra step does improve the users security posture by providing another level of security, admins might want to roll back their users so that they're no longer able to perform Multi-Factor Authentication.
60+
If a user who has completed combined registration goes to the current self-service password reset (SSPR) registration page at [https://aka.ms/ssprsetup](https://aka.ms/ssprsetup), the user will be prompted to perform Multi-Factor Authentication before they can access that page. This step is expected from a technical standpoint, but it's new for users who were previously registered for SSPR only. Though this extra step does improve the user's security posture by providing another level of security, admins might want to roll back their users so that they're no longer able to perform Multi-Factor Authentication.
6661

6762
### How to roll back users
6863

69-
If you, as an admin, want to reset a user's Multi-Factor Authentication settings, you can use the PowerShell script provided in the next section. The script will clear the StrongAuthenticationMethods property for a users mobile app and/or phone number. If you run this script for your users, they'll need to re-register for Multi-Factor Authentication if they need it. We recommend testing rollback with one or two users before rolling back all affected users.
64+
If you, as an admin, want to reset a user's Multi-Factor Authentication settings, you can use the PowerShell script provided in the next section. The script will clear the StrongAuthenticationMethods property for a user's mobile app and/or phone number. If you run this script for your users, they'll need to re-register for Multi-Factor Authentication if they need it. We recommend testing rollback with one or two users before rolling back all affected users.
7065

7166
The steps that follow will help you roll back a user or group of users.
7267

@@ -147,16 +142,16 @@ In a PowerShell window, run the following command, providing the script and user
147142

148143
`<script location> -path <user file location>`
149144

150-
### Disable the preview experience
145+
### Disable the updated experience
151146

152-
To disable the preview experience for your users, complete these steps:
147+
To disable the updated experience for your users, complete these steps:
153148

154149
1. Sign in to the Azure portal as a user administrator.
155150
2. Go to **Azure Active Directory** > **User settings** > **Manage settings for access panel preview features**.
156151
3. Under **Users can use preview features for registering and managing security info**, set the selector to **None**, and then select **Save**.
157152

158-
Users will no longer be prompted to register by using the preview experience.
153+
Users will no longer be prompted to register by using the updated experience.
159154

160155
## Next steps
161156

162-
* [Learn more about the public preview of combined registration for self-service password reset and Azure Multi-Factor Authentication](concept-registration-mfa-sspr-combined.md)
157+
* [Learn more about combined registration for self-service password reset and Azure Multi-Factor Authentication](concept-registration-mfa-sspr-combined.md)

0 commit comments

Comments
 (0)