Skip to content

Commit c20c49c

Browse files
authored
Merge branch 'master' into 4me
2 parents 757ddd2 + 6ac3f33 commit c20c49c

File tree

320 files changed

+5067
-2307
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

320 files changed

+5067
-2307
lines changed

.markdownlint.json

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
{
2+
"default": true,
3+
"MD001": false,
4+
"MD002": false,
5+
"MD003": false,
6+
"MD004": false,
7+
"MD005": false,
8+
"MD006": false,
9+
"MD007": false,
10+
"MD009": false,
11+
"MD010": false,
12+
"MD012": false,
13+
"MD013": false,
14+
"MD014": false,
15+
"MD018": false,
16+
"MD019": false,
17+
"MD020": false,
18+
"MD021": false,
19+
"MD022": false,
20+
"MD023": false,
21+
"MD024": false,
22+
"MD025": false,
23+
"MD026": false,
24+
"MD027": false,
25+
"MD028": false,
26+
"MD029": false,
27+
"MD030": false,
28+
"MD031": false,
29+
"MD032": false,
30+
"MD033": false,
31+
"MD034": false,
32+
"MD035": false,
33+
"MD036": false,
34+
"MD037": false,
35+
"MD038": false,
36+
"MD039": false,
37+
"MD040": false,
38+
"MD041": false,
39+
"MD042": false,
40+
"MD045": false,
41+
"MD046": false,
42+
"MD047": false
43+
}

.openpublishing.redirection.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -135,6 +135,11 @@
135135
"redirect_url": "https://docs.microsoft.com/azure/architecture/topics/high-performance-computing/",
136136
"redirect_document_id": false
137137
},
138+
{
139+
"source_path": "articles/virtual-machines/windows/new-azvm-demo.md",
140+
"redirect_url": "/azure/virtual-machines/windows/quick-create-powershell",
141+
"redirect_document_id": false
142+
},
138143
{
139144
"source_path": "articles/virtual-machines/linux/high-performance-computing.md",
140145
"redirect_url": "https://docs.microsoft.com/azure/architecture/topics/high-performance-computing/",
@@ -37273,11 +37278,6 @@
3727337278
"redirect_url": "/azure/azure-monitor/platform/activity-log-collect-tenants",
3727437279
"redirect_document_id": false
3727537280
},
37276-
{
37277-
"source_path": "articles/azure-monitor/platform/oms-portal-transition.md",
37278-
"redirect_url": "/azure/azure-monitor/overview",
37279-
"redirect_document_id": false
37280-
},
3728137281
{
3728237282
"source_path": "articles/azure-monitor/platform/oms-portal-faq.md",
3728337283
"redirect_url": "/azure/azure-monitor/overview",

articles/active-directory-b2c/active-directory-b2c-reference-spa.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.subservice: B2C
1515

1616
# Single-page sign in using the OAuth 2.0 implicit flow in Azure Active Directory B2C
1717

18-
Many modern applications have a single-page app front end that primarily is written in JavaScript. Often, the app is written by using a framework like AngularJS, Ember.js, or Durandal. Single-page apps and other JavaScript apps that run primarily in a browser have some additional challenges for authentication:
18+
Many modern applications have a single-page app front end that primarily is written in JavaScript. Often, the app is written by using a framework like React, Angular or Vue.js. Single-page apps and other JavaScript apps that run primarily in a browser have some additional challenges for authentication:
1919

2020
- The security characteristics of these apps are different from traditional server-based web applications.
2121
- Many authorization servers and identity providers do not support cross-origin resource sharing (CORS) requests.

articles/active-directory/authentication/concept-authentication-methods.md

Lines changed: 27 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Authentication methods - Azure Active Directory
3-
description: What authentication methods are available in Azure AD for MFA and SSPR
3+
description: Authentication methods available in Azure AD for MFA and SSPR
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 02/20/2019
9+
ms.date: 06/17/2019
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -177,7 +177,9 @@ Once any errors have been addressed, the administrator then can activate each ke
177177

178178
Users may have a combination of up to five OATH hardware tokens or authenticator applications such as the Microsoft Authenticator app configured for use at any time.
179179

180-
## Mobile phone
180+
## Phone options
181+
182+
### Mobile phone
181183

182184
Two options are available to users with mobile phones.
183185

@@ -190,18 +192,18 @@ To work properly, phone numbers must be in the format *+CountryCode PhoneNumber*
190192
>
191193
> Password reset does not support phone extensions. Even in the +1 4255551234X12345 format, extensions are removed before the call is placed.
192194
193-
### Text message
195+
#### Text message
194196

195197
An SMS is sent to the mobile phone number containing a verification code. Enter the verification code provided in the sign-in interface to continue.
196198

197-
### Phone call
199+
#### Phone call
198200

199201
An automated voice call is made to the phone number you provide. Answer the call and press # in the phone keypad to authenticate
200202

201203
> [!IMPORTANT]
202204
> Starting in March of 2019 the phone call options will not be available to MFA and SSPR users in free/trial Azure AD tenants. SMS messages are not impacted by this change. Phone call will continue to be available to users in paid Azure AD tenants. This change only impacts free/trial Azure AD tenants.
203205
204-
## Office phone
206+
### Office phone
205207

206208
An automated voice call is made to the phone number you provide. Answer the call and presses # in the phone keypad to authenticate.
207209

@@ -217,6 +219,25 @@ The office phone attribute is managed by your administrator.
217219
>
218220
> Password reset does not support phone extensions. Even in the +1 4255551234X12345 format, extensions are removed before the call is placed.
219221
222+
### Troubleshooting phone options
223+
224+
Common problems related to authentication methods using a phone number:
225+
226+
* Blocked caller ID on a single device
227+
* Troubleshoot device
228+
* Wrong phone number, incorrect country code, home phone number versus work phone number
229+
* Troubleshoot user object and configured authentication methods. Ensure correct phone numbers are registered.
230+
* Wrong PIN entered
231+
* Confirm user has used the correct PIN registered in Azure MFA Server.
232+
* Call forwarded to voicemail
233+
* Ensure user has phone turned on and that service is available in their area or use alternate method.
234+
* User is blocked
235+
* Have administrator unblock the user in the Azure portal.
236+
* SMS is not subscribed on the device
237+
* Have the user change methods or activate SMS on the device.
238+
* Faulty telecom providers (No phone input detected, missing DTMF tones issues, blocked caller ID on multiple devices, or blocked SMS across multiple devices)
239+
* Microsoft uses multiple telecom providers to route phone calls and SMS messages for authentication. If you are seeing any of the above issues have a user attempt to use the method at least 5 times within 5 minutes and have that user's information available when contacting Microsoft support.
240+
220241
## App Passwords
221242

222243
Certain non-browser apps do not support multi-factor authentication, if a user has been enabled for multi-factor authentication and attempt to use non-browser apps, they are unable to authenticate. An app password allows users to continue to authenticate

articles/active-directory/authentication/howto-mfa-userstates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.collection: M365-identity-device-management
2020
You can take one of two approaches for requiring two-step verification, both of which require using a global administrator account. The first option is to enable each user for Azure Multi-Factor Authentication (MFA). When users are enabled individually, they perform two-step verification each time they sign in (with some exceptions, such as when they sign in from trusted IP addresses or when the _remembered devices_ feature is turned on). The second option is to set up a Conditional Access policy that requires two-step verification under certain conditions.
2121

2222
> [!TIP]
23-
> Choose one of these methods to require two-step verification, not both. Enabling a user for Azure Multi-Factor Authentication overrides any Conditional Access policies.
23+
> Enabling Azure Multi-Factor Authentication using Conditional Access policies is the recommended approach. Changing user states is no longer recommended unless your licenses do not include Conditional Access as it will require users to perform MFA every time they sign in.
2424
2525
## Choose how to enable
2626

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 18 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,16 @@
11
---
22
title: How to block legacy authentication to Azure Active Directory (Azure AD) with Conditional Access| Microsoft Docs
33
description: Learn how to improve your security posture by blocking legacy authentication using Azure AD Conditional Access.
4-
services: active-directory
5-
keywords: Conditional Access to apps, Conditional Access with Azure AD, secure access to company resources, Conditional Access policies
6-
documentationcenter: ''
7-
author: MicrosoftGuyJFlo
8-
manager: daveba
9-
editor: ''
104

11-
ms.subservice: conditional-access
12-
ms.assetid: 8c1d978f-e80b-420e-853a-8bbddc4bcdad
5+
services: active-directory
136
ms.service: active-directory
14-
ms.devlang: na
15-
ms.topic: article
16-
ms.tgt_pltfrm: na
17-
ms.workload: identity
18-
ms.date: 03/25/2019
7+
ms.subservice: conditional-access
8+
ms.topic: conceptual
9+
ms.date: 06/17/2019
10+
1911
ms.author: joflore
12+
author: MicrosoftGuyJFlo
13+
manager: daveba
2014
ms.reviewer: calebb
2115

2216
ms.collection: M365-identity-device-management
@@ -25,20 +19,15 @@ ms.collection: M365-identity-device-management
2519

2620
To give your users easy access to your cloud apps, Azure Active Directory (Azure AD) supports a broad variety of authentication protocols including legacy authentication. However, legacy protocols don’t support multi-factor authentication (MFA). MFA is in many environments a common requirement to address identity theft.
2721

28-
2922
If your environment is ready to block legacy authentication to improve your tenant's protection, you can accomplish this goal with Conditional Access. This article explains how you can configure Conditional Access policies that block legacy authentication for your tenant.
3023

31-
32-
3324
## Prerequisites
3425

3526
This article assumes that you are familiar with:
3627

3728
- The [basic concepts](overview.md) of Azure AD Conditional Access
3829
- The [best practices](best-practices.md) for configuring Conditional Access policies in the Azure portal
3930

40-
41-
4231
## Scenario description
4332

4433
Azure AD supports several of the most widely used authentication and authorization protocols including legacy authentication. Legacy authentication refers to protocols that use basic authentication. Typically, these protocols can't enforce any type of second factor authentication. Examples for apps that are based on legacy authentication are:
@@ -53,12 +42,21 @@ How can you prevent apps using legacy authentication from accessing your tenant'
5342

5443
Conditional Access policies are enforced after the first-factor authentication has been completed. Therefore, Conditional Access is not intended as a first line defense for scenarios like denial-of-service (DoS) attacks, but can utilize signals from these events (e.g. the sign-in risk level, location of the request, and so on) to determine access.
5544

45+
## Implementation
46+
47+
This section explains how to configure a Conditional Access policy to block legacy authentication.
5648

49+
### Identify legacy authentication use
5750

51+
Before you can block legacy authentication in your directory, you need to first understand if your users have apps that use legacy authentication and how it affects your overall directory. Azure AD sign-in logs can be used to understand if you’re using legacy authentication.
5852

59-
## Implementation
53+
1. Navigate to the **Azure portal** > **Azure Active Directory** > **Sign-ins**.
54+
1. Add the Client App column if it is not shown by clicking on **Columns** > **Client App**.
55+
1. Filter by **Client App** > **Other Clients** and click **Apply**.
6056

61-
This section explains how to configure a Conditional Access policy to block legacy authentication.
57+
Filtering will only show you sign-in attempts that were made by legacy authentication protocols. Clicking on each individual sign-in attempt will show you additional details. The **Client App** field under the **Basic Info** tab will indicate which legacy authentication protocol was used.
58+
59+
These logs will indicate which users are still depending on legacy authentication and which applications are using legacy protocols to make authentication requests. For users that do not appear in these logs and are confirmed to not be using legacy authentication, implement a Conditional Access policy for these users only.
6260

6361
### Block legacy authentication
6462

articles/active-directory/develop/msal-net-instantiate-confidential-client-config-options.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -59,12 +59,12 @@ An ASP.NET Core application configuration is described in an *appsettings.json*
5959
}
6060
```
6161

62-
Starting in MSAL.NET v3.x, you can configure your confidential client application from the config file. The classes related to the app configuration are located in the `Microsoft.Identity.Client.AppConfig` namespace.
62+
Starting in MSAL.NET v3.x, you can configure your confidential client application from the config file.
6363

64-
In the class where you want configure and instantiate your application, you need to declare a `ConfidentialClientApplicationOptions` object. Bind the configuration read from the source (including the appconfig.json file) to the instance of the application options:
64+
In the class where you want configure and instantiate your application, you need to declare a `ConfidentialClientApplicationOptions` object. Bind the configuration read from the source (including the appconfig.json file) to the instance of the application options, using the `IConfigurationRoot.Bind()` method from the [Microsoft.Extensions.Configuration.Binder nuget package](https://www.nuget.org/packages/Microsoft.Extensions.Configuration.Binder):
6565

6666
```csharp
67-
using Microsoft.Identity.Client.AppConfig;
67+
using Microsoft.Identity.Client;
6868

6969
private ConfidentialClientApplicationOptions _applicationOptions;
7070
_applicationOptions = new ConfidentialClientApplicationOptions();

articles/active-directory/develop/scenario-web-app-sign-user-app-registration.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -45,14 +45,14 @@ If you navigate to this link, you can create bootstrap the creation of your web
4545
1. If your account gives you access to more than one tenant, select your account in the top-right corner, and set your portal session to the desired Azure AD tenant.
4646
1. In the left-hand navigation pane, select the **Azure Active Directory** service, and then select **App registrations** > **New registration**.
4747
1. When the **Register an application** page appears, enter your application's registration information:
48-
- choose the supported account types for your application (See [Supported Account types](./v2-supported-account-types.md))
49-
- In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `AspNetCore-WebApp`.
50-
- In **Reply URL**, add the reply URL for your app, for instance `https://localhost:44321/`, and select **Register**.
48+
1. choose the supported account types for your application (See [Supported Account types](./v2-supported-account-types.md))
49+
1. In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example `AspNetCore-WebApp`.
50+
1. In **Redirect URI**, add the type of application and the URI destination that will accept returned token responses after successfully authenticating. For example, `https://localhost:44321/`. Select **Register**.
5151
1. Select the **Authentication** menu, and then add the following information:
52-
- In **Reply URL**, add `https://localhost:44321/signin-oidc`, and select **Register**.
53-
- In the **Advanced settings** section, set **sign out URL** to `https://localhost:44321/signout-oidc`.
54-
- Under **Implicit grant**, check **ID tokens**.
55-
- Select **Save**.
52+
1. In **Reply URL**, add `https://localhost:44321/signin-oidc`.
53+
1. In the **Advanced settings** section, set **Logout URL** to `https://localhost:44321/signout-oidc`.
54+
1. Under **Implicit grant**, check **ID tokens**.
55+
1. Select **Save**.
5656

5757
### Register an app using PowerShell
5858

0 commit comments

Comments
 (0)