Skip to content

Commit b7bd169

Browse files
committed
Bringing in line with main. Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into work-whatsnew-nov22
2 parents 7f40a64 + f41ffc3 commit b7bd169

File tree

197 files changed

+3833
-1591
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

197 files changed

+3833
-1591
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -798,6 +798,16 @@
798798
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
799799
"redirect_document_id": false
800800
},
801+
{
802+
"source_path_from_root": "/articles/aks/dapr-troubleshooting.md",
803+
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
804+
"redirect_document_id": false
805+
},
806+
{
807+
"source_path_from_root": "/articles/aks/csi-secrets-store-troubleshooting.md",
808+
"redirect_url": "/troubleshoot/azure/azure-kubernetes/welcome-azure-kubernetes",
809+
"redirect_document_id": false
810+
},
801811
{
802812
"source_path_from_root": "/articles/cdn/index.yml",
803813
"redirect_url": "/azure/frontdoor",

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 27 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 11/03/2022
7+
ms.date: 11/04/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -17,7 +17,7 @@ This topic covers how to enable number matching in Microsoft Authenticator push
1717

1818
>[!NOTE]
1919
>Number matching is a key security upgrade to traditional second factor notifications in Microsoft Authenticator that will begin to be enabled by default for all users starting February 27, 2023.<br>
20-
>We highly recommend enabling number matching in the near-term for improved sign-in security.
20+
>We highly recommend enabling number matching in the near term for improved sign-in security.
2121
2222
## Prerequisites
2323

@@ -358,20 +358,40 @@ To enable number matching in the Azure AD portal, complete the following steps:
358358

359359
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?
360360

361-
Number match will be enabled for all users of Microsoft Authenticator app after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
361+
Number match will be enabled for all users of Microsoft Authenticator after February 27, 2023. Relevant services will begin deploying these changes after February 27, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
362362

363-
### Can I opt out of number matching?
363+
### How should users be prepared for default number matching?
364364

365-
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants by Feb 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
365+
Here are differences in sign-in scenarios that Microsoft Authenticator users will see after number matching is enabled by default:
366+
367+
- Authentication flows will require users to do number match when using Microsoft Authenticator. If their version of Microsoft Authenticator doesn’t support number match, their authentication will fail.
368+
- Self-service password reset (SSPR) and combined registration will also require number match when using Microsoft Authenticator.
369+
- AD FS adapter will require number matching on [supported versions of Windows Server](#ad-fs-adapter). On earlier versions, users will continue to see the **Approve**/**Deny** experience and won’t see number matching until you upgrade.
370+
- NPS extension versions beginning 1.2.2131.2 will require users to do number matching. Because the NPS extension can’t show a number, the user will be asked to enter a One-Time Passcode (OTP). The user must have an OTP authentication method such as Microsoft Authenticator or software OATH tokens registered to see this behavior. If the user doesn’t have an OTP method registered, they’ll continue to get the **Approve**/**Deny** experience.
371+
372+
To create a registry key that overrides this behavior and prompts users with **Approve**/**Deny**:
373+
374+
1. On the NPS Server, open the Registry Editor.
375+
1. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.
376+
1. Set the following Key Value Pair:
377+
Key: OVERRIDE_NUMBER_MATCHING_WITH_OTP
378+
Value = FALSE
379+
1. Restart the NPS Service.
366380

367-
### What about my Apple Watch?
381+
- Apple Watch will remain unsupported for number matching. We recommend you uninstall the Microsoft Authenticator Apple Watch app because you have to approve notifications on your phone.
368382

369-
Apple Watch will remain unsupported for number matching. We recommend you uninstall the Microsoft Authenticator Apple Watch app because you have to approve notifications on your phone.
383+
### Can I opt out of number matching?
384+
385+
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants by Feb 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
370386

371387
### What happens if a user runs an older version of Microsoft Authenticator?
372388

373389
If a user is running an older version of Microsoft Authenticator that doesn't support number matching, authentication won't work if number matching is enabled. Users need to upgrade to the latest version of Microsoft Authenticator to use it for sign-in.
374390

391+
### Why is my user prompted to tap on one out of three numbers instead of entering the number in their Microsoft Authenticator app?
392+
393+
Older versions of Microsoft Authenticator prompt users to tap and select a number instead of entering the number in their Microsoft Authenticator app. These authentications won't fail, but we highly recommend that users update to the latest version of the app to be able to enter the number.
394+
375395

376396
## Next steps
377397

articles/active-directory/develop/troubleshoot-publisher-verification.md

Lines changed: 51 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -19,26 +19,26 @@ If you're unable to complete the process or are experiencing unexpected behavior
1919

2020
1. Review the [requirements](publisher-verification-overview.md#requirements) and ensure they've all been met.
2121

22-
1. Review the instructions to [mark an app as publisher verified](mark-app-as-publisher-verified.md) and ensure all steps have been performed successfully.
22+
2. Review the instructions to [mark an app as publisher verified](mark-app-as-publisher-verified.md) and ensure all steps have been performed successfully.
2323

24-
1. Review the list of [common issues](#common-issues).
24+
3. Review the list of [common issues](#common-issues).
2525

26-
1. Reproduce the request using [Graph Explorer](#making-microsoft-graph-api-calls) to gather more info and rule out any issues in the UI.
26+
4. Reproduce the request using [Graph Explorer](#making-microsoft-graph-api-calls) to gather more info and rule out any issues in the UI.
2727

2828
## Common Issues
2929
Below are some common issues that may occur during the process.
3030

31-
- **I don’t know my Microsoft Partner Network ID (MPN ID) or I don’t know who the primary contact for the account is**
32-
1. Navigate to the [MPN enrollment page](https://partner.microsoft.com/dashboard/account/v3/enrollment/joinnow/basicpartnernetwork/new)
33-
1. Sign in with a user account in the org's primary Azure AD tenant
34-
1. If an MPN account already exists, this will be recognized and you'll be added to the account
35-
1. Navigate to the [partner profile page](https://partner.microsoft.com/pcv/accountsettings/connectedpartnerprofile) where the MPN ID and primary account contact will be listed
31+
- **I don’t know my Microsoft Partner Network ID (MPN ID) or I don’t know who the primary contact for the account is.**
32+
1. Navigate to the [MPN enrollment page](https://partner.microsoft.com/dashboard/account/v3/enrollment/joinnow/basicpartnernetwork/new).
33+
2. Sign in with a user account in the org's primary Azure AD tenant.
34+
3. If an MPN account already exists, this will be recognized and you'll be added to the account.
35+
4. Navigate to the [partner profile page](https://partner.microsoft.com/pcv/accountsettings/connectedpartnerprofile) where the MPN ID and primary account contact will be listed.
3636

3737
- **I don’t know who my Azure AD Global Administrator (also known as company admin or tenant admin) is, how do I find them? What about the Application Administrator or Cloud Application Administrator?**
38-
1. Sign in to the [Azure AD Portal](https://aad.portal.azure.com) using a user account in your organization's primary tenant
39-
1. Navigate to [Role Management](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RolesAndAdministrators)
40-
1. Select the desired admin role
41-
1. The list of users assigned that role will be displayed
38+
1. Sign in to the [Azure AD Portal](https://aad.portal.azure.com) using a user account in your organization's primary tenant.
39+
2. Navigate to [Role Management](https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RolesAndAdministrators).
40+
3. Select the desired admin role.
41+
4. The list of users assigned that role will be displayed.
4242

4343
- **I don't know who the admin(s) for my MPN account are**
4444
Go to the [MPN User Management page](https://partner.microsoft.com/pcv/users) and filter the user list to see what users are in various admin roles.
@@ -47,15 +47,15 @@ Below are some common issues that may occur during the process.
4747
1. Go to your [partner profile](https://partner.microsoft.com/pcv/accountsettings/connectedpartnerprofile) and verify that:
4848
- The MPN ID is correct.
4949
- There are no errors or “pending actions” shown, and the verification status under Legal business profile and Partner info both say “authorized” or “success”.
50-
1. Go to the [MPN tenant management page](https://partner.microsoft.com/dashboard/account/v3/tenantmanagement) and confirm that the tenant the app is registered in and that you're signing with a user account from is on the list of associated tenants. To add another tenant, follow the instructions [here](/partner-center/multi-tenant-account). Be aware that all Global Admins of any tenant you add will be granted Global Admin privileges on your Partner Center account.
51-
1. Go to the [MPN User Management page](https://partner.microsoft.com/pcv/users) and confirm the user you're signing in as is either a Global Admin, MPN Admin, or Accounts Admin. To add a user to a role in Partner Center, follow the instructions [here](/partner-center/create-user-accounts-and-set-permissions).
50+
2. Go to the [MPN tenant management page](https://partner.microsoft.com/dashboard/account/v3/tenantmanagement) and confirm that the tenant the app is registered in and that you're signing with a user account from is on the list of associated tenants. To add another tenant, follow the instructions [here](/partner-center/multi-tenant-account). Be aware that all Global Admins of any tenant you add will be granted Global Admin privileges on your Partner Center account.
51+
3. Go to the [MPN User Management page](https://partner.microsoft.com/pcv/users) and confirm the user you're signing in as is either a Global Admin, MPN Admin, or Accounts Admin. To add a user to a role in Partner Center, follow the instructions [here](/partner-center/create-user-accounts-and-set-permissions).
5252

5353
- **When I sign into the Azure AD portal, I do not see any apps registered. Why?**
5454
Your app registrations may have been created using a different user account in this tenant, a personal/consumer account, or in a different tenant. Ensure you're signed in with the correct account in the tenant where your app registrations were created.
5555

5656
- **I'm getting an error related to multi-factor authentication. What should I do?**
5757
Ensure [multi-factor authentication](../fundamentals/concept-fundamentals-mfa-get-started.md) is enabled and **required** for the user you're signing in with and for this scenario. For example, MFA could be:
58-
- Always required for the user you're signing in with
58+
- Always required for the user you're signing in with.
5959
- [Required for Azure management](../conditional-access/howto-conditional-access-policy-azure-management.md).
6060
- [Required for the type of administrator](../conditional-access/howto-conditional-access-policy-admin-mfa.md) you're signing in with.
6161

@@ -184,7 +184,18 @@ Most commonly caused by the wrong MPN ID being provided.
184184

185185
The target application (`AppId`) can’t be found. Provide a valid application ID and try again.
186186

187-
Most commonly caused when verification is being performed via Graph API, and the ID of the application provided is incorrect. Note- the ID of the application must be provided, not the AppId/ClientId.
187+
Most commonly caused when verification is being performed via Graph API, and the ID of the application provided is incorrect. Note that the ID of the application must be provided, not the AppId/ClientId.
188+
189+
### ApplicationObjectisInvalid
190+
191+
The target application's object ID is invalid. Please provide a valid ID and try again.
192+
193+
Most commonly caused when the verification is being performed via Graph API, and the ID of the application provided does not exist.
194+
195+
> [!NOTE]
196+
> The Object ID of the application must be provided, not the AppId/ClientId. See "id" on the list of application properties at [application resource type - Microsoft Graph v1.0 | Microsoft Learn](/graph/api/resources/application).
197+
198+
188199

189200
### B2CTenantNotAllowed
190201

@@ -202,41 +213,56 @@ Occurs when a [Publisher Domain](howto-configure-publisher-domain.md) isn't conf
202213

203214
### PublisherDomainMismatch
204215

205-
The target application's Publisher Domain (`publisherDomain`) doesn't match the domain used to perform email verification in Partner Center (`pcDomain`). Ensure these domains match and try again.
216+
The target application's Publisher Domain (`publisherDomain`) either doesn't match the domain used to perform email verification in Partner Center (`pcDomain`) or has not been verified. Ensure these domains match and have been verified then try again.
206217

207-
Occurs when neither the app's [Publisher Domain](howto-configure-publisher-domain.md) nor one of the [custom domains](../fundamentals/add-custom-domain.md) added to the Azure AD tenant match the domain used to perform email verification in Partner Center.
218+
Occurs when neither the app's [Publisher Domain](howto-configure-publisher-domain.md) nor one of the [custom domains](../fundamentals/add-custom-domain.md) added to the Azure AD tenant match the domain used to perform email verification in Partner Center or has not been verified.
219+
220+
See [requirements](publisher-verification-overview.md) for a list of allowed domain or sub-domain matches.
208221

209222
### NotAuthorizedToVerifyPublisher
210223

211-
You aren't authorized to set the verified publisher property on application (<`AppId`)
224+
You aren't authorized to set the verified publisher property on application (<`AppId`).
212225

213226
Most commonly caused by the signed-in user not being a member of the proper role for the MPN account in Azure AD- see [requirements](publisher-verification-overview.md#requirements) for a list of eligible roles and see [common issues](#common-issues) for more information.
214227

215228
### MPNIdWasNotProvided
216229

217230
The MPN ID wasn't provided in the request body or the request content type wasn't "application/json".
218231

232+
Most commonly caused when the verification is being performed via Graph API, and the MPN ID wasn’t provided in the request.
233+
219234
### MSANotSupported
220235

221236
This feature isn't supported for Microsoft consumer accounts. Only applications registered in Azure AD by an Azure AD user are supported.
222237

238+
Occurs when a consumer account (Hotmail, Messenger, OneDrive, MSN, Xbox Live, or Microsoft 365).
239+
223240
### InteractionRequired
224241

225-
Occurs when multi-factor authentication hasn't been performed before attempting to add a verified publisher to the app. See [common issues](#common-issues) for more information. Note: MFA must be performed in the same session when attempting to add a verified publisher. If MFA is enabled but not required to be performed in the session, the request will fail.
242+
Occurs when multi-factor authentication (MFA) hasn't been enabled and performed before attempting to add a verified publisher to the app. See [common issues](#common-issues) for more information. Note: MFA must be performed in the same session when attempting to add a verified publisher. If MFA is enabled but not required to be performed in the session, the request will fail.
226243

227244
The error message displayed will be: "Due to a configuration change made by your administrator, or because you moved to a new location, you must use multi-factor authentication to proceed."
228245

229-
### UnableToAddPublisher
246+
### UserUnableToAddPublisher
230247

231-
One of these error messages are displayed: "A verified publisher can’t be added to this application. Contact your administrator for assistance.", or "You're unable to add a verified publisher to this application. Contact your administrator for assistance."
248+
When a request to add a verified publisher is made, many signals are used to make a security risk assessment. If the user risk state is determined to be ‘AtRisk’, an error, “You're unable to add a verified publisher to this application. Contact your administrator for assistance” will be returned. Please investigate the user risk and take the appropriate steps to remediate the risk (guidance below):
232249

233-
First, verify you've met the [publisher verification requirements](publisher-verification-overview.md#requirements).
250+
> [Investigate risk](/azure/active-directory/identity-protection/howto-identity-protection-investigate-risk#risky-users)
234251
235-
> [!NOTE]
236-
> If you've met the publisher verification requirements and are still having issues, try using an existing or newly created user with similar permissions.
252+
> [Remediate risk/unblock users](/azure/active-directory/identity-protection/howto-identity-protection-remediate-unblock)
253+
254+
> [Self-remediation guidance](/azure/active-directory/identity-protection/howto-identity-protection-remediate-unblock)
255+
256+
> Self-serve password reset (SSPR): If the organization allows SSPR, use aka.ms/sspr to reset the password for remediation. Please choose a strong password; Choosing a weak password may not reset the risk state.
257+
258+
> [!NOTE]
259+
> Please give some time after remediation for the risk state to update, and then try again.
260+
261+
### UnableToAddPublisher
237262

238263
When a request to add a verified publisher is made, many signals are used to make a security risk assessment. If the request is determined to be risky an error will be returned. For security reasons, Microsoft doesn't disclose the specific criteria used to determine whether a request is risky or not. If you received this error and believe the "risky" assessment is incorrect, try waiting and resubmitting the verification request. Some customers have reported success after multiple attempts.
239264

265+
240266
## Next steps
241267

242268
If you've reviewed all of the previous information and are still receiving an error from Microsoft Graph, gather as much of the following information as possible related to the failing request and [contact Microsoft support](developer-support-help-options.md#create-an-azure-support-request).

0 commit comments

Comments
 (0)