Skip to content

Commit b7dd691

Browse files
Merge branch 'main' into yuwzho/update-doc
2 parents 3e401d1 + e89312c commit b7dd691

File tree

608 files changed

+13239
-6502
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

608 files changed

+13239
-6502
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "articles/storage/tables/table-storage-design-encrypt-data.md",
5+
"redirect_url": "/previous-versions/azure/storage/tables/table-storage-design-encrypt-data",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path": "articles/databox-online/azure-stack-edge-zero-touch-provisioning.md",
510
"redirect_url": "/azure/databox-online/azure-stack-edge-powershell-based-configuration",
@@ -22445,6 +22450,11 @@
2244522450
"source_path": "articles/private-multi-access-edge-compute-mec/metaswitch-fusion-core-overview.md",
2244622451
"redirect_URL": "/azure/private-5g-core",
2244722452
"redirect_document_id": false
22453+
},
22454+
{
22455+
"source_path": "articles/private-5g-core/modify-site-plan.md",
22456+
"redirect_URL": "/azure/private-5g-core/modify-service-plan",
22457+
"redirect_document_id": false
2244822458
},
2244922459
{
2245022460
"source_path": "articles/communications-gateway/rotate-secrets.md",
@@ -22455,6 +22465,11 @@
2245522465
"source_path": "articles/batch/high-availability-disaster-recovery.md",
2245622466
"redirect_URL": "/azure/reliability/reliability-batch",
2245722467
"redirect_document_id": false
22468+
},
22469+
{
22470+
"source_path_from_root": "/articles/communication-services/concepts/bring-your-own-storage.md",
22471+
"redirect_url": "/azure/communication-services/concepts/call-automation/call-recording/bring-your-own-storage",
22472+
"redirect_document_id": false
2245822473
}
2245922474

2246022475
]

articles/active-directory/app-provisioning/application-provisioning-config-problem-scim-compatibility.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ Following the steps below will delete your existing customappsso job and create
269269

270270
11. In the results of the last step, copy the full "ID" string that begins with "scim". Optionally, reapply your old attribute-mappings by running the command below, replacing [new-job-id] with the new job ID you copied, and entering the JSON output from step #7 as the request body.
271271

272-
`POST https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs/[new-job-id]/schema`
272+
`PUT https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronization/jobs/[new-job-id]/schema`
273273
`{ <your-schema-json-here> }`
274274

275275
12. Return to the first web browser window, and select the **Provisioning** tab for your application.

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 21 additions & 21 deletions
Large diffs are not rendered by default.

articles/active-directory/app-proxy/application-proxy-deployment-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ The following design elements should increase the success of your pilot implemen
144144
* Restrict visibility of the pilot application’s icon to a pilot group by hiding its launch icon form the Azure MyApps portal. When ready for production you can scope the app to its respective targeted audience, either in the same pre-production tenant, or by also publishing the application in your production tenant.
145145

146146
**Single sign-on settings**:
147-
Some SSO settings have specific dependencies that can take time to set up, so avoid change control delays by ensuring dependencies are addressed ahead of time. This includes domain joining connector hosts to perform SSO using Kerberos Constrained Delegation (KCD) and taking care of other time-consuming activities. For example, Setting up a PING Access instance, if needing header-based SSO.
147+
Some SSO settings have specific dependencies that can take time to set up, so avoid change control delays by ensuring dependencies are addressed ahead of time. This includes domain joining connector hosts to perform SSO using Kerberos Constrained Delegation (KCD) and taking care of other time-consuming activities.
148148

149149
**TLS Between Connector Host and Target Application**: Security is paramount, so TLS between the connector host and target applications should always be used. Particularly if the web application is configured for forms-based authentication (FBA), as user credentials are then effectively transmitted in clear text.
150150

articles/active-directory/authentication/concept-authentication-methods-manage.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,6 @@ To manage the Authentication methods policy, click **Security** > **Authenticati
3838

3939
Only the [converged registration experience](concept-registration-mfa-sspr-combined.md) is aware of the Authentication methods policy. Users in scope of the Authentication methods policy but not the converged registration experience won't see the correct methods to register.
4040

41-
>[!NOTE]
42-
>Some pieces of the Authentication methods policy experience are in preview. This includes management of Email OTP, third party software OATH tokens, SMS, and voice call as noted in the portal. Also, use of the authentication methods policy alone with the legacy MFA and SSPR polices disabled is a preview experience.
43-
4441
## Legacy MFA and SSPR policies
4542

4643
Two other policies, located in **Multifactor authentication** settings and **Password reset** settings, provide a legacy way to manage some authentication methods for all users in the tenant. You can't control who uses an enabled authentication method, or how the method can be used. A [Global Administrator](../roles/permissions-reference.md#global-administrator) is needed to manage these policies.
@@ -76,7 +73,7 @@ For users who are enabled for **Mobile phone** for SSPR, the independent control
7673

7774
Similarly, let's suppose you enable **Voice calls** for a group. After you enable it, you find that even users who aren't group members can sign-in with a voice call. In this case, it's likely those users are enabled for **Mobile phone** in the legacy SSPR policy or **Call to phone** in the legacy MFA policy.
7875

79-
## Migration between policies (preview)
76+
## Migration between policies
8077

8178
The Authentication methods policy provides a migration path toward unified administration of all authentication methods. All desired methods can be enabled in the Authentication methods policy. Methods in the legacy MFA and SSPR policies can be disabled. Migration has three settings to let you move at your own pace, and avoid problems with sign-in or SSPR during the transition. After migration is complete, you'll centralize control over authentication methods for both sign-in and SSPR in a single place, and the legacy MFA and SSPR policies will be disabled.
8279

@@ -107,8 +104,7 @@ Tenants are set to either Pre-migration or Migration in Progress by default, dep
107104
> In the future, both of these features will be integrated with the Authentication methods policy.
108105
109106
## Known issues and limitations
110-
- Some customers may see the control to enable Voice call grayed out due to a licensing requirement, despite having a premium license. This is a known issue that we are actively working to fix.
111-
- As a part of the public preview we removed the ability to target individual users. Previously targeted users will remain in the policy but we recommend moving them to a targeted group.
107+
- In recent updates we removed the ability to target individual users. Previously targeted users will remain in the policy but we recommend moving them to a targeted group.
112108

113109
## Next steps
114110

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -19,27 +19,13 @@ ms.collection: M365-identity-device-management
1919

2020
Before combined registration, users registered authentication methods for Azure AD Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for multifactor authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both multifactor authentication and SSPR. We recommend this video on [How to enable and configure SSPR in Azure AD](https://www.youtube.com/watch?v=rA8TvhNcCvQ)
2121

22-
> [!NOTE]
23-
> Effective Oct. 1st, 2022, we will begin to enable combined registration for all users in Azure AD tenants created before August 15th, 2020. Tenants created after this date are enabled with combined registration.
24-
25-
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
26-
27-
> [!div class="nextstepaction"]
28-
> [Enable combined security registration](howto-registration-mfa-sspr-combined.md)
2922

3023
![My Account showing registered Security info for a user](media/concept-registration-mfa-sspr-combined/combined-security-info-defaults-registered.png)
3124

3225
Before enabling the new experience, review this administrator-focused documentation and the user-focused documentation to ensure you understand the functionality and effect of this feature. Base your training on the [user documentation](https://support.microsoft.com/account-billing/set-up-your-security-info-from-a-sign-in-prompt-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout.
3326

3427
Azure AD combined security information registration is available for Azure US Government but not Azure China 21Vianet.
3528

36-
> [!IMPORTANT]
37-
> Users that are enabled for both the original preview and the enhanced combined registration experience see the new behavior. Users that are enabled for both experiences see only the My Account experience. The *My Account* aligns with the look and feel of combined registration and provides a seamless experience for users. Users can see My Account by going to [https://myaccount.microsoft.com](https://myaccount.microsoft.com).
38-
>
39-
> You can set **Require users to register when signing in** to **Yes** to require all users to register when signing in, ensuring that all users are protected.
40-
>
41-
> You might encounter an error message while trying to access the Security info option, such as, "Sorry, we can't sign you in". Confirm that you don't have any configuration or group policy object that blocks third-party cookies on the web browser.
42-
4329
*My Account* pages are localized based on the language settings of the computer accessing the page. Microsoft stores the most recent language used in the browser cache, so subsequent attempts to access the pages continue to render in the last language used. If you clear the cache, the pages re-render.
4430

4531
If you want to force a specific language, you can add `?lng=<language>` to the end of the URL, where `<language>` is the code of the language you want to render.
@@ -131,6 +117,10 @@ Users can access manage mode by going to [https://aka.ms/mysecurityinfo](https:/
131117

132118
## Key usage scenarios
133119

120+
### Protect Security info registration with Conditional Access
121+
To secure when and how users register for Azure AD Multi-Factor Authentication and self-service password reset, you can use user actions in Conditional Access policy. This functionality may be enabled in organizations that want users to register for Azure AD Multi-Factor Authentication and SSPR from a central location, such as a trusted network location during HR onboarding. Learn more on how to configure [common Conditional Access policies for securing security info registration.](../conditional-access/howto-conditional-access-policy-registration.md)
122+
123+
134124
### Set up security info during sign-in
135125

136126
An admin has enforced registration.

articles/active-directory/authentication/concept-sspr-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ The two-gate policy requires two pieces of authentication data, such as an email
9696
* A custom domain has been configured for your Azure AD tenant, such as *contoso.com*; or
9797
* Azure AD Connect is synchronizing identities from your on-premises directory
9898

99-
You can disable the use of SSPR for administrator accounts using the [Set-MsolCompanySettings](/powershell/module/msonline/set-msolcompanysettings) PowerShell cmdlet. The `-SelfServePasswordResetEnabled $False` parameter disables SSPR for administrators. Policy changes to disable or enable SSPR for administrator accounts can take up to 60 minutes to take effect.
99+
You can disable the use of SSPR for administrator accounts using the [Update-MgPolicyAuthorizationPolicy](/powershell/module/microsoft.graph.identity.signins/update-mgpolicyauthorizationpolicy) PowerShell cmdlet. The `-AllowedToUseSspr:$true|$false ` parameter enables/disables SSPR for administrators. Policy changes to enable or disable SSPR for administrator accounts can take up to 60 minutes to take effect.
100100

101101
### Exceptions
102102

articles/active-directory/authentication/concept-system-preferred-multifactor-authentication.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use system-preferred multifactor authentication
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 03/20/2023
7+
ms.date: 03/22/2023
88
ms.author: justinha
99
author: justinha
1010
manager: amycolannino
@@ -99,12 +99,13 @@ When a user signs in, the authentication process checks which authentication met
9999
1. [Temporary Access Pass](howto-authentication-temporary-access-pass.md)
100100
1. [Certificate-based authentication](concept-certificate-based-authentication.md)
101101
1. [FIDO2 security key](concept-authentication-passwordless.md#fido2-security-keys)
102+
1. [Microsoft Authenticator push notifications](concept-authentication-authenticator-app.md)
102103
1. [Time-based one-time password (TOTP)](concept-authentication-oath-tokens.md)<sup>1</sup>
103104
1. [Telephony](concept-authentication-phone-options.md)<sup>2</sup>
104105

105106
<sup>1</sup> Includes hardware or software TOTP from Microsoft Authenticator, Authenticator Lite, or third-party applications.
106-
<sup>2</sup> Includes SMS and voice calls.
107107

108+
<sup>2</sup> Includes SMS and voice calls.
108109

109110
### How does system-preferred MFA affect AD FS or NPS extension?
110111

@@ -113,6 +114,7 @@ System-preferred MFA doesn't affect users who sign in by using Active Directory
113114
### What happens for users who aren't specified in the Authentication methods policy but enabled in the legacy MFA tenant-wide policy?
114115

115116
The system-preferred MFA also applies for users who are enabled for MFA in the legacy MFA policy.
117+
116118
:::image type="content" border="true" source="./media/how-to-mfa-number-match/legacy-settings.png" alt-text="Screenshot of legacy MFA settings.":::
117119

118120
## Next steps

articles/active-directory/authentication/howto-authentication-passwordless-phone.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: authentication
99
ms.topic: how-to
10-
ms.date: 01/29/2023
10+
ms.date: 03/21/2023
1111

1212

1313
ms.author: justinha
1414
author: justinha
1515
manager: amycolannino
16-
ms.reviewer: librown
16+
ms.reviewer: librown; tilarso
1717

1818
ms.collection: M365-identity-device-management
1919
---
@@ -78,7 +78,19 @@ To enable the authentication method for passwordless phone sign-in, complete the
7878
7979
## User registration
8080

81-
Users register themselves for the passwordless authentication method of Azure AD. For users who already registered the Microsoft Authenticator app for [multi-factor authentication](./concept-mfa-howitworks.md), skip to the next section, [enable phone sign-in](#enable-phone-sign-in). To register the Microsoft Authenticator app, follow these steps:
81+
Users register themselves for the passwordless authentication method of Azure AD. For users who already registered the Microsoft Authenticator app for [multi-factor authentication](./concept-mfa-howitworks.md), skip to the next section, [enable phone sign-in](#enable-phone-sign-in).
82+
83+
### Direct phone Sign-in registration
84+
Users can register for passwordless phone sign-in directly within the Microsoft Authenticator app without the need to first registering Microsoft Authenticator with their account, all while never accruing a password. Here's how:
85+
1. Acquire a [Temporary Access Pass](../authentication/howto-authentication-temporary-access-pass.md) from your Admin or Organization.
86+
2. Download and install the Microsoft Authenticator app on your mobile device.
87+
3. Open Microsoft Authenticator and click **Add account** and then choose **Work or school account.**
88+
4. Choose **Sign in."
89+
5. Follow the instructions to sign-in with your account using the Temporary Access Pass provided by your Admin or Organization.
90+
6. Once signed-in, continue following the additional steps to set up phone sign-in.
91+
92+
### Guided registration with My Sign-ins
93+
To register the Microsoft Authenticator app, follow these steps:
8294

8395
1. Browse to [https://aka.ms/mysecurityinfo](https://aka.ms/mysecurityinfo).
8496
1. Sign in, then select **Add method** > **Authenticator app** > **Add** to add Microsoft Authenticator.

articles/active-directory/authentication/howto-mfa-getstarted.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -156,11 +156,7 @@ A major step in every multifactor authentication deployment is getting users reg
156156

157157
### Combined registration for SSPR and Azure AD MFA
158158

159-
> [!NOTE]
160-
> Starting on August 15th 2020, all new Azure AD tenants will be automatically enabled for combined registration. Tenants created after this date will be unable to utilize the legacy registration workflows.
161-
> After Sept. 30th, 2022, all existing Azure AD tenants will be automatically enabled for combined registration.
162-
163-
We recommend that organizations use the [combined registration experience for Azure AD Multi-Factor Authentication and self-service password reset (SSPR)](howto-registration-mfa-sspr-combined.md). SSPR allows users to reset their password in a secure way using the same methods they use for Azure AD Multi-Factor Authentication. Combined registration is a single step for end users. To make sure you understand the functionality and end-user experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
159+
[The combined registration experience for Azure AD Multi-Factor Authentication and self-service password reset (SSPR)](howto-registration-mfa-sspr-combined.md) enables users to register for both MFA and SSPR in a unified experience. SSPR allows users to reset their password in a secure way using the same methods they use for Azure AD Multi-Factor Authentication. To make sure you understand the functionality and end-user experience, see the [Combined security information registration concepts](concept-registration-mfa-sspr-combined.md).
164160

165161
It's critical to inform users about upcoming changes, registration requirements, and any necessary user actions. We provide [communication templates](https://aka.ms/mfatemplates) and [user documentation](https://support.microsoft.com/account-billing/set-up-security-info-from-a-sign-in-page-28180870-c256-4ebf-8bd7-5335571bf9a8) to prepare your users for the new experience and help to ensure a successful rollout. Send users to https://myprofile.microsoft.com to register by selecting the **Security Info** link on that page.
166162

0 commit comments

Comments
 (0)