Skip to content

Commit c2200ce

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents a5655d0 + 390462f commit c2200ce

File tree

227 files changed

+4787
-3059
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

227 files changed

+4787
-3059
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,11 @@
7575
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
7676
"redirect_document_id": false
7777
},
78+
{
79+
"source_path_from_root": "/articles/active-directory/saas-apps/usertesting-tutorial.md",
80+
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
81+
"redirect_document_id": false
82+
},
7883
{
7984
"source_path_from_root": "/articles/active-directory/saas-apps/otsuka-shokai-tutorial.md",
8085
"redirect_url": "/azure/active-directory/saas-apps/tutorial-list",
@@ -4405,7 +4410,7 @@
44054410
"source_path_from_root": "/articles/active-directory/reports-monitoring/recommendations-integrate-third-party-apps.md",
44064411
"redirect_url": "/azure/active-directory/reports-monitoring/overview-recommendations",
44074412
"redirect_document_id": false
4408-
},
4413+
},
44094414
{
44104415
"source_path_from_root": "/articles/active-directory/reports-monitoring/workbook-legacy authentication.md",
44114416
"redirect_url": "/azure/active-directory/reports-monitoring/workbook-legacy-authentication",

.openpublishing.redirection.healthcare-apis.json

Lines changed: 673 additions & 668 deletions
Large diffs are not rendered by default.

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10808,6 +10808,11 @@
1080810808
"redirect_url": "/azure/devtest-labs/add-artifact-repository",
1080910809
"redirect_document_id": false
1081010810
},
10811+
{
10812+
"source_path_from_root": "/articles/devtest-labs/devtest-lab-faq.md",
10813+
"redirect_url": "/azure/devtest-labs/",
10814+
"redirect_document_id": false
10815+
},
1081110816
{
1081210817
"source_path_from_root": "/articles/lab-services/devtest-lab-add-claimable-vm.md",
1081310818
"redirect_url": "/azure/devtest-labs/devtest-lab-add-claimable-vm",
Lines changed: 10 additions & 126 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory business-to-customer (B2C)"
33
description: "New and updated documentation for the Azure Active Directory business-to-customer (B2C)."
4-
ms.date: 10/31/2022
4+
ms.date: 03/01/2023
55
ms.service: active-directory
66
ms.subservice: B2C
77
ms.topic: reference
@@ -15,6 +15,15 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
1717

18+
## February 2023
19+
20+
### Updated articles
21+
22+
- [Azure Active Directory B2C code samples](integrate-with-app-code-samples.md)
23+
- [JSON claims transformations](json-transformations.md)
24+
- [Set up sign-in for a specific Azure Active Directory organization in Azure Active Directory B2C](identity-provider-azure-ad-single-tenant.md)
25+
- [Page layout versions](page-layout.md)
26+
1827
## January 2023
1928

2029
### New articles
@@ -71,128 +80,3 @@ Welcome to what's new in Azure Active Directory B2C documentation. This article
7180
- [Set up a password reset flow in Azure Active Directory B2C](add-password-reset-policy.md)
7281
- [What is Azure Active Directory B2C?](overview.md)
7382
- [Technical and feature overview of Azure Active Directory B2C](technical-overview.md)
74-
75-
## November 2022
76-
77-
### New articles
78-
79-
- [Configure Azure Active Directory B2C with Akamai Enterprise Application Access for SSO and secure hybrid access](partner-akamai-secure-hybrid-access.md)
80-
81-
### Updated articles
82-
83-
- [Manage your Azure Active Directory B2C tenant](tenant-management-manage-administrator.md)
84-
- [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-operations.md)
85-
- [Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
86-
- [Roles and resource access control](roles-resource-access-control.md)
87-
- [Define an Azure Active Directory technical profile in an Azure Active Directory B2C custom policy](active-directory-technical-profile.md)
88-
89-
## October 2022
90-
91-
### New articles
92-
93-
- [Edit Azure Active Directory B2C Identity Experience Framework (IEF) XML with Grit Visual IEF Editor](partner-grit-editor.md)
94-
- [Register apps in Azure Active Directory B2C](register-apps.md)
95-
96-
### Updated articles
97-
98-
- [Set up sign-in for a specific Azure Active Directory organization in Azure Active Directory B2C](identity-provider-azure-ad-single-tenant.md)
99-
- [Set up a password reset flow in Azure Active Directory B2C](add-password-reset-policy.md)
100-
- [Azure Active Directory B2C documentation landing page](index.yml)
101-
- [Publish your Azure Active Directory B2C app to the Azure Active Directory app gallery](publish-app-to-azure-ad-app-gallery.md)
102-
- [JSON claims transformations](json-transformations.md)
103-
104-
## September
105-
106-
### New articles
107-
108-
- [Tutorial: Configure the Grit IAM B2B2C solution with Azure Active Directory B2C](partner-grit-iam.md)
109-
110-
## August 2022
111-
112-
### New articles
113-
114-
- [Configure Azure Active Directory B2C with Deduce to combat identity fraud and create a trusted user experience](partner-deduce.md)
115-
116-
### Updated articles
117-
118-
- [Clean up resources and delete the tenant](tutorial-delete-tenant.md)
119-
- [Set up sign-up and sign-in with a Twitter account using Azure Active Directory B2C](identity-provider-twitter.md)
120-
- [JSON claims transformations](json-transformations.md)
121-
- [Extensions app in Azure AD B2C](extensions-app.md)
122-
- [Manage Azure AD B2C with Microsoft Graph](microsoft-graph-operations.md)
123-
- [Define custom attributes in Azure Active Directory B2C](user-flow-custom-attributes.md)
124-
- [Azure Active Directory B2C: What's new](whats-new-docs.md)
125-
- [Page layout versions](page-layout.md)
126-
127-
## July 2022
128-
129-
### New articles
130-
131-
- [Configure authentication in a sample React single-page application by using Azure Active Directory B2C](configure-authentication-sample-react-spa-app.md)
132-
- [Configure authentication options in a React application by using Azure Active Directory B2C](enable-authentication-react-spa-app-options.md)
133-
- [Enable authentication in your own React Application by using Azure Active Directory B2C](enable-authentication-react-spa-app.md)
134-
135-
### Updated articles
136-
137-
- [Enable custom domains for Azure Active Directory B2C](custom-domain.md)
138-
- [Set up sign-up and sign-in with a Twitter account using Azure Active Directory B2C](identity-provider-twitter.md)
139-
- [Page layout versions](page-layout.md)
140-
- [Monitor Azure AD B2C with Azure Monitor](azure-monitor.md)
141-
- [Enable JavaScript and page layout versions in Azure Active Directory B2C](javascript-and-page-layout.md)
142-
- [Localization string IDs](localization-string-ids.md)
143-
144-
## June 2022
145-
146-
### New articles
147-
148-
- [Configure authentication in an Azure Static Web App by using Azure AD B2C](configure-authentication-in-azure-static-app.md)
149-
- [Configure authentication in an Azure Web App configuration file by using Azure AD B2C](configure-authentication-in-azure-web-app-file-based.md)
150-
- [Configure authentication in an Azure Web App by using Azure AD B2C](configure-authentication-in-azure-web-app.md)
151-
- [Enable authentication options in an Azure Static Web App by using Azure AD B2C](enable-authentication-azure-static-app-options.md)
152-
- [Enable authentication in your own Python web application using Azure Active Directory B2C](enable-authentication-python-web-app.md)
153-
- [Set up OAuth 2.0 client credentials flow in Azure Active Directory B2C](client-credentials-grant-flow.md)
154-
- [Configure WhoIAM Rampart with Azure Active Directory B2C](partner-whoiam-rampart.md)
155-
156-
### Updated articles
157-
158-
- [Configure authentication in a sample Python web app by using Azure AD B2C](configure-authentication-sample-python-web-app.md)
159-
- [Single-page application sign-in using the OAuth 2.0 implicit flow in Azure Active Directory B2C](implicit-flow-single-page-application.md)
160-
- [Set up OAuth 2.0 client credentials flow in Azure Active Directory B2C](client-credentials-grant-flow.md)
161-
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](tutorial-create-user-flows.md)
162-
- [Configure TheAccessHub Admin Tool by using Azure Active Directory B2C](partner-n8identity.md)
163-
- [Monitor Azure AD B2C with Azure Monitor](azure-monitor.md)
164-
165-
166-
## May 2022
167-
168-
### Updated articles
169-
170-
- [Set redirect URLs to b2clogin.com for Azure Active Directory B2C](b2clogin.md)
171-
- [Enable custom domains for Azure Active Directory B2C](custom-domain.md)
172-
- [Configure xID with Azure Active Directory B2C for passwordless authentication](partner-xid.md)
173-
- [UserJourneys](userjourneys.md)
174-
- [Secure your API used an API connector in Azure AD B2C](secure-rest-api.md)
175-
176-
## April 2022
177-
178-
### New articles
179-
180-
- [Tutorial: Configure Azure Web Application Firewall with Azure Active Directory B2C](partner-azure-web-application-firewall.md)
181-
- [Configure Asignio with Azure Active Directory B2C for multi-factor authentication](partner-asignio.md)
182-
- [Set up sign-up and sign-in with Mobile ID using Azure Active Directory B2C](identity-provider-mobile-id.md)
183-
- [Find help and open a support ticket for Azure Active Directory B2C](find-help-open-support-ticket.md)
184-
185-
### Updated articles
186-
187-
- [Configure authentication in a sample single-page application by using Azure AD B2C](configure-authentication-sample-spa-app.md)
188-
- [Configure xID with Azure Active Directory B2C for passwordless authentication](partner-xid.md)
189-
- [Azure Active Directory B2C service limits and restrictions](service-limits.md)
190-
- [Localization string IDs](localization-string-ids.md)
191-
- [Manage your Azure Active Directory B2C tenant](tenant-management-manage-administrator.md)
192-
- [Page layout versions](page-layout.md)
193-
- [Secure your API used an API connector in Azure AD B2C](secure-rest-api.md)
194-
- [Azure Active Directory B2C: What's new](whats-new-docs.md)
195-
- [Application types that can be used in Active Directory B2C](application-types.md)
196-
- [Publish your Azure Active Directory B2C app to the Azure Active Directory app gallery](publish-app-to-azure-ad-app-gallery.md)
197-
- [Quickstart: Set up sign in for a desktop app using Azure Active Directory B2C](quickstart-native-app-desktop.md)
198-
- [Register a single-page application (SPA) in Azure Active Directory B2C](tutorial-register-spa.md)

articles/active-directory/authentication/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,12 +54,14 @@
5454
href: concept-sspr-policy.md
5555
- name: Licenses
5656
href: concept-sspr-licensing.md
57-
- name: Multi-Factor Authentication
57+
- name: Multifactor Authentication
5858
items:
5959
- name: How MFA works
6060
href: concept-mfa-howitworks.md
6161
- name: Default protection
6262
href: concept-authentication-default-enablement.md
63+
- name: System-preferred MFA
64+
href: concept-system-preferred-multifactor-authentication.md
6365
- name: Prompts and session lifetime
6466
href: concepts-azure-multi-factor-authentication-prompts-session-lifetime.md
6567
- name: Data residency

articles/active-directory/authentication/concept-authentication-default-enablement.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 10/26/2022
9+
ms.date: 02/24/2023
1010

1111
ms.author: justinha
1212
author: mjsantani
@@ -58,6 +58,7 @@ The following table lists each setting that can be set to Microsoft managed and
5858
| [Registration campaign](how-to-mfa-registration-campaign.md) | Disabled |
5959
| [Location in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
6060
| [Application name in Microsoft Authenticator notifications](how-to-mfa-additional-context.md) | Disabled |
61+
| [System-preferred MFA](concept-system-preferred-multifactor-authentication.md) | Disabled |
6162

6263
As threat vectors change, Azure AD may announce default protection for a **Microsoft managed** setting in [release notes](../fundamentals/whats-new.md) and on commonly read forums like [Tech Community](https://techcommunity.microsoft.com/).
6364

Lines changed: 132 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,132 @@
1+
---
2+
title: System-preferred multifactor authentication (MFA) - Azure Active Directory
3+
description: Learn how to use system-preferred multifactor authentication
4+
ms.service: active-directory
5+
ms.subservice: authentication
6+
ms.topic: conceptual
7+
ms.date: 02/28/2023
8+
ms.author: justinha
9+
author: justinha
10+
manager: amycolannino
11+
ms.reviewer: msft-poulomi
12+
ms.collection: M365-identity-device-management
13+
14+
15+
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
16+
---
17+
# System-preferred multifactor authentication - Authentication methods policy
18+
19+
System-preferred multifactor authentication (MFA) prompts users to sign in by using the most secure method they registered. Administrators can enable system-preferred MFA to improve sign-in security and discourage less secure sign-in methods like SMS.
20+
21+
For example, if a user registered both SMS and Microsoft Authenticator push notifications as methods for MFA, system-preferred MFA prompts the user to sign in by using the more secure push notification method. The user can still choose to sign in by using another method, but they're first prompted to try the most secure method they registered.
22+
23+
System-preferred MFA is a Microsoft managed setting, which is a [tristate policy](#authentication-method-feature-configuration-properties). For preview, the **default** state is disabled. If you want to turn it on for all users or a group of users during preview, you need to explicitly change the Microsoft managed state to **enabled** by using Microsoft Graph API. Sometime after general availability, the Microsoft managed state for system-preferred MFA will change to **enabled**.
24+
25+
After system-preferred MFA is enabled, the authentication system does all the work. Users don't need to set any authentication method as their default because the system always determines and presents the most secure method they registered.
26+
27+
## Enable system-preferred MFA
28+
29+
To enable system-preferred MFA in advance, you need to choose a single target group for the schema configuration, as shown in the [Request](#request) example.
30+
31+
### Authentication method feature configuration properties
32+
33+
By default, system-preferred MFA is [Microsoft managed](concept-authentication-default-enablement.md#microsoft-managed-settings) and disabled during preview. After generally availability, the Microsoft managed state default value will change to enable system-preferred MFA.
34+
35+
| Property | Type | Description |
36+
|----------|------|-------------|
37+
| excludeTarget | featureTarget | A single entity that is excluded from this feature. <br>You can only exclude one group from system-preferred MFA, which can be a dynamic or nested group.|
38+
| includeTarget | featureTarget | A single entity that is included in this feature. <br>You can only include one group for system-preferred MFA, which can be a dynamic or nested group.|
39+
| State | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
40+
41+
### Feature target properties
42+
43+
System-preferred MFA can be enabled only for a single group, which can be a dynamic or nested group.
44+
45+
| Property | Type | Description |
46+
|----------|------|-------------|
47+
| id | String | ID of the entity targeted. |
48+
| targetType | featureTargetType | The kind of entity targeted, such as group, role, or administrative unit. The possible values are: 'group', 'administrativeUnit', 'role', 'unknownFutureValue'. |
49+
50+
Use the following API endpoint to enable **systemCredentialPreferences** and include or exclude groups:
51+
52+
```
53+
https://graph.microsoft.com/beta/authenticationMethodsPolicy
54+
```
55+
56+
>[!NOTE]
57+
>In Graph Explorer, you need to consent to the **Policy.ReadWrite.AuthenticationMethod** permission.
58+
59+
### Request
60+
61+
The following example excludes a sample target group and includes all users. For more information, see [Update authenticationMethodsPolicy](/graph/api/authenticationmethodspolicy-update?view=graph-rest-beta).
62+
63+
```http
64+
PATCH https://graph.microsoft.com/beta/policies/authenticationMethodsPolicy
65+
Content-Type: application/json
66+
67+
{
68+
"systemCredentialPreferences": {
69+
"state": "enabled",
70+
"excludeTargets": [
71+
{
72+
"id": "d1411007-6fcf-4b4c-8d70-1da1857ed33c",
73+
"targetType": "group"
74+
}
75+
],
76+
"includeTargets": [
77+
{
78+
"id": "all_users",
79+
"targetType": "group"
80+
}
81+
]
82+
}
83+
}
84+
```
85+
86+
## Known issues
87+
88+
- [FIDO2 security key isn't supported on iOS mobile devices](../develop/support-fido2-authentication.md#mobile). This issue might surface when system-preferred MFA is enabled. Until a fix is available, we recommend not using FIDO2 security keys on iOS devices.
89+
90+
## Common questions
91+
92+
### How does system-preferred MFA determine the most secure method?
93+
94+
When a user signs in, the authentication process checks which authentication methods are registered for the user. The user is prompted to sign-in with the most secure method according to the following order. The order of authentication methods is dynamic. It's updated as the security landscape changes, and as better authentication methods emerge.
95+
96+
1. Temporary Access Pass
97+
1. Certificate-based authentication
98+
1. FIDO2 security key
99+
1. Microsoft Authenticator notification
100+
1. Companion app notification
101+
1. Microsoft Authenticator time-based one-time password (TOTP)
102+
1. Companion app TOTP
103+
1. Hardware token based TOTP
104+
1. Software token based TOTP
105+
1. SMS over mobile
106+
1. OnewayVoiceMobileOTP
107+
1. OnewayVoiceAlternateMobileOTP
108+
1. OnewayVoiceOfficeOTP
109+
1. TwowayVoiceMobile
110+
1. TwowayVoiceAlternateMobile
111+
1. TwowayVoiceOffice
112+
1. TwowaySMSOverMobile
113+
114+
### How does system-preferred MFA affect AD FS or NPS extension?
115+
116+
System-preferred MFA doesn't affect users who sign in by using Active Directory Federation Services (AD FS) or Network Policy Server (NPS) extension. Those users don't see any change to their sign-in experience.
117+
118+
### What if the most secure MFA method isn't available?
119+
120+
If the user doesn't have that have the most secure method available, they can sign in with another method. After sign-in, they're redirected to their Security info page to remove the registration of the authentication method that isn't available.
121+
122+
For example, let's say an end user misplaces their FIDO2 security key. When they try to sign in without their security key, they can click **I can't use my security key right now** and continue to sign in by using another method, like a time-based one-time password (TOTP). After sign-in, their Security info page appears and they need to remove their FIDO2 security key registration. They can register the method again later if they find their FIDO2 security key.
123+
124+
### What happens for users who aren't specified in the Authentication methods policy but enabled in the legacy MFA tenant-wide policy?
125+
126+
The system-preferred MFA also applies for users who are enabled for MFA in the legacy MFA policy.
127+
:::image type="content" border="true" source="./media/how-to-mfa-number-match/legacy-settings.png" alt-text="Screenshot of legacy MFA settings.":::
128+
129+
## Next steps
130+
131+
* [Authentication methods in Azure Active Directory](concept-authentication-authenticator-app.md)
132+
* [How to run a registration campaign to set up Microsoft Authenticator](how-to-mfa-registration-campaign.md)
10.6 KB
Loading

0 commit comments

Comments
 (0)