Skip to content

Commit bdfa992

Browse files
authored
Merge pull request #209496 from MicrosoftDocs/main
8/29 AM Publish
2 parents a5daa3d + 36504a7 commit bdfa992

File tree

94 files changed

+790
-460
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

94 files changed

+790
-460
lines changed

articles/active-directory-b2c/partner-dynamics-365-fraud-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.subservice: B2C
1717

1818
# Tutorial: Configure Microsoft Dynamics 365 Fraud Protection with Azure Active Directory B2C
1919

20-
In this sample tutorial, learn how to integrate [Microsoft Dynamics 365 Fraud Protection](/dynamics365/fraud-protection) (DFP) with Azure Active Directory (AD) B2C.
20+
In this sample tutorial, learn how to integrate [Microsoft Dynamics 365 Fraud Protection](/dynamics365/fraud-protection/ap-overview) (DFP) with Azure Active Directory (AD) B2C.
2121

2222
Microsoft DFP provides organizations with the capability to assess the risk of attempts to create fraudulent accounts and log-ins. Microsoft DFP assessment can be used by the customer to block or challenge suspicious attempts to create new fake accounts or to compromise existing accounts.
2323

articles/active-directory/authentication/howto-authentication-temporary-access-pass.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ c5dbd20a-8b8f-4791-a23f-488fcbde3b38 5/22/2022 11:19:17 PM False True
113113
114114
```
115115

116-
For more information, see [New-MgUserAuthenticationTemporaryAccessPassMethod](/powershell/module/microsoft.graph.identity.signins/new-mguserauthenticationtemporaryaccesspassmethod&preserve-view=true) and [Get-MgUserAuthenticationTemporaryAccessPassMethod](/powershell/module/microsoft.graph.identity.signins/get-mguserauthenticationtemporaryaccesspassmethod?view=graph-powershell-beta&preserve-view=true).
116+
For more information, see [New-MgUserAuthenticationTemporaryAccessPassMethod](/powershell/module/microsoft.graph.identity.signins/new-mguserauthenticationtemporaryaccesspassmethod) and [Get-MgUserAuthenticationTemporaryAccessPassMethod](/powershell/module/microsoft.graph.identity.signins/get-mguserauthenticationtemporaryaccesspassmethod?view=graph-powershell-beta&preserve-view=true).
117117

118118
## Use a Temporary Access Pass
119119

articles/active-directory/cloud-sync/reference-cloud-sync-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ metadata:
44
description: This document describes frequently asked questions for cloud sync.
55
services: active-directory
66
author: billmath
7-
manager: karenhoran
7+
manager: amycolannino
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: faq

articles/active-directory/conditional-access/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,8 @@
8282
href: howto-conditional-access-policy-location.md
8383
- name: Block access
8484
href: howto-conditional-access-policy-block-access.md
85+
- name: Require MFA for Intune enrollment
86+
href: /mem/intune/enrollment/multi-factor-authentication?toc=/azure/active-directory/conditional-access/TOC.json
8587
- name: Configure resilience defaults
8688
href: resilience-defaults.md
8789
- name: Configure report only mode

articles/active-directory/conditional-access/howto-conditional-access-policy-risk-user.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
Microsoft works with researchers, law enforcement, various security teams at Microsoft, and other trusted sources to find leaked username and password pairs. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating [Azure AD Identity Protection user risk detections](../identity-protection/concept-identity-protection-risks.md).
2121

22-
There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes in the policy.
22+
There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes like sign-in frequency in the policy.
2323

2424
## Template deployment
2525

@@ -41,21 +41,21 @@ Organizations can choose to deploy this policy using the steps outlined below or
4141
1. Under **Access controls** > **Grant**.
4242
1. Select **Grant access**, **Require password change**.
4343
1. Select **Select**.
44+
1. Under **Session**.
45+
1. Select **Sign-in frequency**.
46+
1. Ensure **Every time** is selected.
47+
1. Select **Select**.
4448
1. Confirm your settings, and set **Enable policy** to **Report-only**.
4549
1. Select **Create** to create to enable your policy.
4650

47-
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
51+
After administrators confirm the settings using [report-only mode](howto-conditional-access-insights-reporting.md), they can move the **Enable policy** toggle from **Report-only** to **On**.
4852

4953
## Next steps
5054

51-
[Remediate risks and unblock users](../identity-protection/howto-identity-protection-remediate-unblock.md)
52-
53-
[Conditional Access common policies](concept-conditional-access-policy-common.md)
54-
55-
[Sign-in risk-based Conditional Access](howto-conditional-access-policy-risk.md)
56-
57-
[Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
58-
59-
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
60-
61-
[What is Azure Active Directory Identity Protection?](../identity-protection/overview-identity-protection.md)
55+
- [Require reauthentication every time](../conditional-access/howto-conditional-access-session-lifetime.md#require-reauthentication-every-time)
56+
- [Remediate risks and unblock users](../identity-protection/howto-identity-protection-remediate-unblock.md)
57+
- [Conditional Access common policies](concept-conditional-access-policy-common.md)
58+
- [Sign-in risk-based Conditional Access](howto-conditional-access-policy-risk.md)
59+
- [Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
60+
- [Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
61+
- [What is Azure Active Directory Identity Protection?](../identity-protection/overview-identity-protection.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-risk.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ Most users have a normal behavior that can be tracked, when they fall outside of
2121

2222
A sign-in risk represents the probability that a given authentication request isn't authorized by the identity owner. Organizations with Azure AD Premium P2 licenses can create Conditional Access policies incorporating [Azure AD Identity Protection sign-in risk detections](../identity-protection/concept-identity-protection-risks.md#sign-in-risk).
2323

24-
There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes in the policy.
24+
There are two locations where this policy may be configured, Conditional Access and Identity Protection. Configuration using a Conditional Access policy is the preferred method providing more context including enhanced diagnostic data, report-only mode integration, Graph API support, and the ability to utilize other Conditional Access attributes like sign-in frequency in the policy.
2525

26-
The Sign-in risk-based policy protects users from registering MFA in risky sessions. If users aren't registered for MFA, their risky sign-ins will get blocked, and they see an AADSTS53004 error.
26+
The Sign-in risk-based policy protects users from registering MFA in risky sessions. If users aren't registered for MFA, their risky sign-ins are blocked, and they see an AADSTS53004 error.
2727

2828
## Template deployment
2929

@@ -45,21 +45,21 @@ Organizations can choose to deploy this policy using the steps outlined below or
4545
1. Under **Access controls** > **Grant**.
4646
1. Select **Grant access**, **Require multifactor authentication**.
4747
1. Select **Select**.
48+
1. Under **Session**.
49+
1. Select **Sign-in frequency**.
50+
1. Ensure **Every time** is selected.
51+
1. Select **Select**.
4852
1. Confirm your settings and set **Enable policy** to **Report-only**.
4953
1. Select **Create** to create to enable your policy.
5054

51-
After confirming your settings using [report-only mode](howto-conditional-access-insights-reporting.md), an administrator can move the **Enable policy** toggle from **Report-only** to **On**.
55+
After administrators confirm the settings using [report-only mode](howto-conditional-access-insights-reporting.md), they can move the **Enable policy** toggle from **Report-only** to **On**.
5256

5357
## Next steps
5458

55-
[Remediate risks and unblock users](../identity-protection/howto-identity-protection-remediate-unblock.md)
56-
57-
[Conditional Access common policies](concept-conditional-access-policy-common.md)
58-
59-
[User risk-based Conditional Access](howto-conditional-access-policy-risk-user.md)
60-
61-
[Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
62-
63-
[Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
64-
65-
[What is Azure Active Directory Identity Protection?](../identity-protection/overview-identity-protection.md)
59+
- [Require reauthentication every time](../conditional-access/howto-conditional-access-session-lifetime.md#require-reauthentication-every-time)
60+
- [Remediate risks and unblock users](../identity-protection/howto-identity-protection-remediate-unblock.md)
61+
- [Conditional Access common policies](concept-conditional-access-policy-common.md)
62+
- [User risk-based Conditional Access](howto-conditional-access-policy-risk-user.md)
63+
- [Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
64+
- [Simulate sign in behavior using the Conditional Access What If tool](troubleshoot-conditional-access-what-if.md)
65+
- [What is Azure Active Directory Identity Protection?](../identity-protection/overview-identity-protection.md)

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 17 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 08/22/2022
1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: amycolannino
14-
ms.reviewer: jlu, calebb, ripull
14+
ms.reviewer: calebb, ripull, inbarc
1515

1616
ms.collection: M365-identity-device-management
1717
---
@@ -58,7 +58,7 @@ Sign-in frequency previously applied to only to the first factor authentication
5858

5959
### User sign-in frequency and device identities
6060

61-
If you have Azure AD joined, hybrid Azure AD joined, or Azure AD registered devices, when a user unlocks their device or signs in interactively, this event will satisfy the sign-in frequency policy as well. In the following two examples user sign-in frequency is set to 1 hour:
61+
On Azure AD joined, hybrid Azure AD joined, or Azure AD registered devices, unlocking the device or signing in interactively will satisfy the sign-in frequency policy. In the following two examples user sign-in frequency is set to 1 hour:
6262

6363
Example 1:
6464

@@ -73,29 +73,23 @@ Example 2:
7373
- At 00:45, the user returns from their break and unlocks the device.
7474
- At 01:45, the user is prompted to sign in again based on the sign-in frequency requirement in the Conditional Access policy configured by their administrator since the last sign-in happened at 00:45.
7575

76-
### Require reauthentication every time (preview)
76+
### Require reauthentication every time
7777

7878
There are scenarios where customers may want to require a fresh authentication, every time before a user performs specific actions. Sign-in frequency has a new option for **Every time** in addition to hours or days.
7979

80-
The public preview supports the following scenarios:
80+
Supported scenarios:
8181

8282
- Require user reauthentication during [Intune device enrollment](/mem/intune/fundamentals/deployment-guide-enrollment), regardless of their current MFA status.
8383
- Require user reauthentication for risky users with the [require password change](concept-conditional-access-grant.md#require-password-change) grant control.
8484
- Require user reauthentication for risky sign-ins with the [require multifactor authentication](concept-conditional-access-grant.md#require-multi-factor-authentication) grant control.
8585

8686
When administrators select **Every time**, it will require full reauthentication when the session is evaluated.
8787

88-
> [!NOTE]
89-
> An early preview version included the option to prompt for Secondary authentication methods only at reauthentication. This option is no longer supported and should not be used.
90-
91-
> [!WARNING]
92-
> Using require reauthentication every time with the sign-in risk grant control set to **No risk** isn’t supported and will result in poor user experience.
93-
9488
## Persistence of browsing sessions
9589

9690
A persistent browser session allows users to remain signed in after closing and reopening their browser window.
9791

98-
The Azure AD default for browser session persistence allows users on personal devices to choose whether to persist the session by showing a “Stay signed in?” prompt after successful authentication. If browser persistence is configured in AD FS using the guidance in the article [AD FS Single Sign-On Settings](/windows-server/identity/ad-fs/operations/ad-fs-single-sign-on-settings#enable-psso-for-office-365-users-to-access-sharepoint-online), we'll comply with that policy and persist the Azure AD session as well. You can also configure whether users in your tenant see the “Stay signed in?” prompt by changing the appropriate setting in the company branding pane in Azure portal using the guidance in the article [Customize your Azure AD sign-in page](../fundamentals/customize-branding.md).
92+
The Azure AD default for browser session persistence allows users on personal devices to choose whether to persist the session by showing a “Stay signed in?” prompt after successful authentication. If browser persistence is configured in AD FS using the guidance in the article [AD FS single sign-on settings](/windows-server/identity/ad-fs/operations/ad-fs-single-sign-on-settings#enable-psso-for-office-365-users-to-access-sharepoint-online), we'll comply with that policy and persist the Azure AD session as well. You can also configure whether users in your tenant see the “Stay signed in?” prompt by changing the appropriate setting in the [company branding pane](../fundamentals/customize-branding.md).
9993

10094
## Configuring authentication session controls
10195

@@ -123,13 +117,10 @@ To make sure that your policy works as expected, the recommended best practice i
123117
124118
1. Under **Access controls** > **Session**.
125119
1. Select **Sign-in frequency**.
126-
1. Enter the required value of days or hours in the first text box.
127-
1. Select a value of **Hours** or **Days** from dropdown.
120+
1. Choose **Periodic reauthentication** and enter a value of hours or days or select **Every time**.
128121
1. Save your policy.
129122

130-
![Conditional Access policy configured for sign-in frequency](media/howto-conditional-access-session-lifetime/conditional-access-policy-session-sign-in-frequency.png)
131-
132-
On Azure AD registered Windows devices, sign in to the device is considered a prompt. For example, if you've configured the sign-in frequency to 24 hours for Office apps, users on Azure AD registered Windows devices will satisfy the sign-in frequency policy by signing in to the device and will be not prompted again when opening Office apps.
123+
> ![Conditional Access policy configured for sign-in frequency](media/howto-conditional-access-session-lifetime/conditional-access-policy-session-sign-in-frequency.png)
133124
134125
### Policy 2: Persistent browser session
135126

@@ -144,13 +135,12 @@ On Azure AD registered Windows devices, sign in to the device is considered a pr
144135
145136
1. Under **Access controls** > **Session**.
146137
1. Select **Persistent browser session**.
147-
1. Select a value from dropdown.
148-
1. Save your policy.
149138

150-
![Conditional Access policy configured for persistent browser](media/howto-conditional-access-session-lifetime/conditional-access-policy-session-persistent-browser.png)
139+
> [!NOTE]
140+
> Persistent Browser Session configuration in Azure AD Conditional Access overrides the “Stay signed in?” setting in the company branding pane in the Azure portal for the same user if you have configured both policies.
151141
152-
> [!NOTE]
153-
> Persistent Browser Session configuration in Azure AD Conditional Access will overwrite the “Stay signed in?” setting in the company branding pane in the Azure portal for the same user if you have configured both policies.
142+
1. Select a value from dropdown.
143+
1. Save your policy.
154144

155145
### Policy 3: Sign-in frequency control every time risky user
156146

@@ -165,25 +155,24 @@ On Azure AD registered Windows devices, sign in to the device is considered a pr
165155
1. Under **Cloud apps or actions** > **Include**, select **All cloud apps**.
166156
1. Under **Conditions** > **User risk**, set **Configure** to **Yes**. Under **Configure user risk levels needed for policy to be enforced** select **High**, then select **Done**.
167157
1. Under **Access controls** > **Grant**, select **Grant access**, **Require password change**, and select **Select**.
168-
1. Under **Session controls** > **Sign-in frequency**, select **Every time (preview)**.
158+
1. Under **Session controls** > **Sign-in frequency**, select **Every time**.
169159
1. Confirm your settings and set **Enable policy** to **Report-only**.
170160
1. Select **Create** to create to enable your policy.
171161

172162
After administrators confirm your settings using [report-only mode](howto-conditional-access-insights-reporting.md), they can move the **Enable policy** toggle from **Report-only** to **On**.
173163

174164
### Validation
175165

176-
Use the What-If tool to simulate a sign-in from the user to the target application and other conditions based on how you configured your policy. The authentication session management controls show up in the result of the tool.
177-
178-
![Conditional Access What If tool results](media/howto-conditional-access-session-lifetime/conditional-access-what-if-tool-result.png)
166+
Use the [What If tool](what-if-tool.md) to simulate a sign-in from the user to the target application and other conditions based on how you configured your policy. The authentication session management controls show up in the result of the tool.
179167

180168
## Prompt tolerance
181169

182-
We factor for five minutes of clock skew, so that we don’t prompt users more often than once every five minutes. If the user has done MFA in the last 5 minutes, and they hit another Conditional Access policy that requires reauthentication, we won't prompt the user. Over-promoting users for reauthentication can impact their productivity and increase the risk of users approving MFA requests they didn’t initiate. We highly recommend using “Sign-in frequency – every time” only for specific business needs.
170+
We factor for five minutes of clock skew, so that we don’t prompt users more often than once every five minutes. If the user has done MFA in the last 5 minutes, and they hit another Conditional Access policy that requires reauthentication, we won't prompt the user. Over-promoting users for reauthentication can impact their productivity and increase the risk of users approving MFA requests they didn’t initiate. Use “Sign-in frequency – every time” only for specific business needs.
183171

184172
## Known issues
185-
- If you configure sign-in frequency for mobile devices, authentication after each sign-in frequency interval could be slow (it can take 30 seconds on average). Also, it could happen across various apps at the same time.
186-
- In iOS devices, if an app configures certificates as the first authentication factor and the app has both Sign-in frequency and [Intune mobile application management](/mem/intune/apps/app-lifecycle) policies applied, the end-users will be blocked from signing in to the app when the policy is triggered.
173+
174+
- If you configure sign-in frequency for mobile devices: Authentication after each sign-in frequency interval could be slow, it can take 30 seconds on average. Also, it could happen across various apps at the same time.
175+
- On iOS devices: If an app configures certificates as the first authentication factor and the app has both Sign-in frequency and [Intune mobile application management policies](/mem/intune/apps/app-lifecycle) applied, end-users are blocked from signing in to the app when the policy triggers.
187176

188177
## Next steps
189178

Loading

articles/active-directory/governance/access-reviews-application-preparation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Planning for a successful access reviews campaign for a particular
44
services: active-directory
55
documentationCenter: ''
66
author: markwahl-msft
7-
manager: karenhoran
7+
manager: amycolannino
88
editor:
99
ms.service: active-directory
1010
ms.workload: identity

0 commit comments

Comments
 (0)