Skip to content

Commit bfa4359

Browse files
committed
Merge branch 'master' of https://github.com/Microsoft/azure-docs-pr into tmmetadataupdate
2 parents 311111b + f57952d commit bfa4359

File tree

82 files changed

+1618
-533
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

82 files changed

+1618
-533
lines changed

articles/active-directory-b2c/tutorial-register-applications.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,9 @@ If you haven't already created your own [Azure AD B2C Tenant](tutorial-create-te
4646

4747
If your application exchanges a code for a token, you need to create an application secret.
4848

49-
1. Select **Keys** and then click **Generate key**.
50-
2. Select **Save** to view the key. Make note of the **App key** value. You use the value as the application secret in your application's code.
49+
1. Navigate back to the newly created app after following above tutorial.
50+
2. Select **Keys** and then click **Generate key**.
51+
3. Select **Save** to view the key. Make note of the **App key** value. You use the value as the application secret in your application's code.
5152

5253
## Next steps
5354

Lines changed: 21 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: What is conditional access in Azure Active Directory? | Microsoft Docs
3-
description: Learn how conditional access in Azure Active Directory helps you to implement automated access decisions that are not only based on who tries to access a resource but also how a resource is accessed.
2+
title: What is Conditional Access in Azure Active Directory? | Microsoft Docs
3+
description: Learn how Conditional Access in Azure Active Directory helps you to implement automated access decisions that are not only based on who tries to access a resource but also how a resource is accessed.
44

55
services: active-directory
66
ms.service: active-directory
@@ -13,18 +13,18 @@ author: MicrosoftGuyJFlo
1313
manager: daveba
1414
ms.reviewer: calebb
1515

16-
#Customer intent: As an IT admin, I want to understand conditional access well enough so that I can control how users are accessing my resources.
16+
#Customer intent: As an IT admin, I want to understand Conditional Access well enough so that I can control how users are accessing my resources.
1717
ms.collection: M365-identity-device-management
1818
---
19-
# What is conditional access in Azure Active Directory?
19+
# What is Conditional Access?
2020

21-
Security is a top concern for organizations using the cloud. A key aspect of cloud security is identity and access when it comes to managing your cloud resources. In a mobile-first, cloud-first world, users can access your organization's resources using a variety of devices and apps from anywhere. As a result of this, just focusing on who can access a resource is not sufficient anymore. To master the balance between security and productivity, you also need to factor how a resource is accessed into an access control decision. With Azure Active Directory (Azure AD) conditional access, you can address this requirement. Conditional access is a capability of Azure Active Directory. With conditional access, you can implement automated access control decisions for accessing your cloud apps that are based on conditions.
21+
Security is a top concern for organizations using the cloud. A key aspect of cloud security is identity and access when it comes to managing your cloud resources. In a mobile-first, cloud-first world, users can access your organization's resources using a variety of devices and apps from anywhere. As a result of this, just focusing on who can access a resource is not sufficient anymore. To master the balance between security and productivity, you also need to factor how a resource is accessed into an access control decision. With Azure Active Directory (Azure AD) Conditional Access, you can address this requirement. Conditional Access is a capability of Azure Active Directory. With Conditional Access, you can implement automated access control decisions for accessing your cloud apps that are based on conditions.
2222

23-
Conditional access policies are enforced after the first-factor authentication has been completed. Therefore, conditional access is not intended as a first line defense for scenarios like denial-of-service (DoS) attacks, but can utilize signals from these events (e.g. the sign-in risk level, location of the request, and so on) to determine access.
23+
Conditional Access policies are enforced after the first-factor authentication has been completed. Therefore, Conditional Access is not intended as a first line defense for scenarios like denial-of-service (DoS) attacks, but can utilize signals from these events (e.g. the sign-in risk level, location of the request, and so on) to determine access.
2424

2525
![Control](./media/overview/81.png)
2626

27-
This article provides you with a conceptual overview of conditional access in Azure AD.
27+
This article provides you with a conceptual overview of Conditional Access in Azure AD.
2828

2929
## Common scenarios
3030

@@ -33,9 +33,9 @@ In a mobile-first, cloud-first world, Azure Active Directory enables single sign
3333
- Empower users to be productive wherever and whenever
3434
- Protect the corporate assets at any time
3535

36-
By using conditional access policies, you can apply the right access controls under the required conditions. Azure AD conditional access provides you with added security when needed and stays out of your user’s way when it isn’t.
36+
By using Conditional Access policies, you can apply the right access controls under the required conditions. Azure AD Conditional Access provides you with added security when needed and stays out of your user’s way when it isn’t.
3737

38-
Following are some common access concerns that conditional access can help you with:
38+
Following are some common access concerns that Conditional Access can help you with:
3939

4040
- **[Sign-in risk](conditions.md#sign-in-risk)**: Azure AD Identity Protection detects sign-in risks. How do you restrict access if a detected sign-in risk indicates a bad actor? What if you would like to get stronger evidence that a sign-in was performed by the legitimate user? What if your doubts are strong enough to even block specific users from accessing an app?
4141

@@ -45,40 +45,39 @@ Following are some common access concerns that conditional access can help you w
4545

4646
- **[Client application](conditions.md#client-apps)**: Today, you can access many cloud apps using different app types such as web-based apps, mobile apps, or desktop apps. What if an access attempt is performed using a client app type that causes known issues? What if you require a device that is managed by your IT department for certain app types?
4747

48-
These questions and the related answers represent common access scenarios for Azure AD conditional access.
49-
Conditional access is a capability of Azure Active Directory that enables you to handle access scenarios using a policy-based approach.
48+
These questions and the related answers represent common access scenarios for Azure AD Conditional Access.
49+
Conditional Access is a capability of Azure Active Directory that enables you to handle access scenarios using a policy-based approach.
5050

5151
> [!VIDEO https://www.youtube.com/embed/eLAYBwjCGoA]
5252
53-
## Conditional access policies
53+
## Conditional Access policies
5454

55-
A conditional access policy is a definition of an access scenario using the following pattern:
55+
A Conditional Access policy is a definition of an access scenario using the following pattern:
5656

5757
![Control](./media/overview/10.png)
5858

59-
**Then do this** specifies the response of your policy. It is important to note that the objective of a conditional access policy is not to grant access to a cloud app. In Azure AD, granting access to cloud apps is subject of user assignments. With a conditional access policy, you control how authorized users (users that have been granted access to a cloud app) can access cloud apps under specific conditions. In your response, you enforce additional requirements such as multi-factor authentication, a managed device, and others. In the context of Azure AD conditional access, the requirements your policy enforces are called access controls. In the most restrictive form, your policy can block access. For more information, see [Access controls in Azure Active Directory conditional access](controls.md).
6059

61-
**When this happens** defines the reason for triggering your policy. This reason is characterized by a group of conditions that have been satisfied. In Azure AD conditional access, the two assignment conditions play a special role:
60+
**When this happens** defines the reason for triggering your policy. This reason is characterized by a group of conditions that have been satisfied. In Azure AD Conditional Access, the two assignment conditions play a special role:
6261

6362
- **[Users](conditions.md#users-and-groups)**: The users performing an access attempt (**Who**).
6463

6564
- **[Cloud apps](conditions.md#cloud-apps-and-actions)**: The targets of an access attempt (**What**).
6665

67-
These two conditions are mandatory in a conditional access policy. In addition to the two mandatory conditions, you can also include additional conditions that describe how the access attempt is performed. Common examples are using mobile devices or locations that are outside your corporate network. For more information, see [Conditions in Azure Active Directory conditional access](conditions.md).
66+
These two conditions are mandatory in a Conditional Access policy. In addition to the two mandatory conditions, you can also include additional conditions that describe how the access attempt is performed. Common examples are using mobile devices or locations that are outside your corporate network. For more information, see [Conditions in Azure Active Directory Conditional Access](conditions.md).
6867

69-
The combination of conditions with your access controls represents a conditional access policy.
68+
The combination of conditions with your access controls represents a Conditional Access policy.
7069

7170
![Control](./media/overview/51.png)
7271

73-
With Azure AD conditional access, you can control how authorized users can access your cloud apps. The objective of a conditional access policy is to enforce additional access controls on an access attempt to a cloud app based on how an access attempt is performed.
72+
With Azure AD Conditional Access, you can control how authorized users can access your cloud apps. The objective of a Conditional Access policy is to enforce additional access controls on an access attempt to a cloud app based on how an access attempt is performed.
7473

7574
A policy-based approach to protect access to your cloud apps enables you to start drafting the policy requirements for your environment using the structure outlined in this article without worrying about the technical implementation.
7675

77-
## Azure AD conditional access and federated authentication
76+
## Azure AD Conditional Access and federated authentication
7877

79-
Conditional access policies work seamlessly with [federated authentication](../../security/azure-ad-choose-authn.md#federated-authentication). This support includes all supported conditions and controls and visibility into how policy is applied to active user sign-ins using [Azure AD reporting](../reports-monitoring/concept-sign-ins.md).
78+
Conditional Access policies work seamlessly with [federated authentication](../../security/azure-ad-choose-authn.md#federated-authentication). This support includes all supported conditions and controls and visibility into how policy is applied to active user sign-ins using [Azure AD reporting](../reports-monitoring/concept-sign-ins.md).
8079

81-
*Federated authentication with Azure AD* means that a trusted authentication service handles user authentication to Azure AD. A trusted authentication service is, for example, Active Directory Federation Services (AD FS), or any other federation service. In this configuration, primary user authentication is performed at the service and then Azure AD is used to sign into individual applications. Azure AD conditional access is applied before access is granted to the application the user is accessing.
80+
*Federated authentication with Azure AD* means that a trusted authentication service handles user authentication to Azure AD. A trusted authentication service is, for example, Active Directory Federation Services (AD FS), or any other federation service. In this configuration, primary user authentication is performed at the service and then Azure AD is used to sign into individual applications. Azure AD Conditional Access is applied before access is granted to the application the user is accessing.
8281

8382
When the configured conditional access policy requires multi-factor authentication, Azure AD defaults to using Azure MFA. If you use the federation service for MFA, you can configure Azure AD to redirect to the federation service when MFA is needed by setting `-SupportsMFA` to `$true` in [PowerShell](https://docs.microsoft.com/powershell/module/msonline/set-msoldomainfederationsettings). This setting works for federated authentication services that support the MFA challenge request issued by Azure AD using `wauth= http://schemas.microsoft.com/claims/multipleauthn`.
8483

@@ -90,4 +89,4 @@ After the user has signed in to the federated authentication service, Azure AD h
9089

9190
## Next steps
9291

93-
To learn how to implement conditional access in your environment, see [Plan your conditional access deployment in Azure Active Directory](plan-conditional-access.md).
92+
To learn how to implement Conditional Access in your environment, see [Plan your Conditional Access deployment in Azure Active Directory](plan-conditional-access.md).

0 commit comments

Comments
 (0)