You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md
+5-11Lines changed: 5 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,30 +74,24 @@ Now we'll walk through each step:
74
74
75
75
## Certificate-based authentication is MFA capable
76
76
77
-
Azure AD CBA is an MFA (Multi factor authentication) capable method, that is Azure AD CBA can be either Single (SF) or Multi-factor (MF) depending on the tenant configuration. Enabling CBA for a user indicates the user is potentially capable of MFA. This means a user may need additional configuration to proof up to register other authentication methods when the user is in scope for CBA.
77
+
Azure AD CBA is an MFA (Multi factor authentication) capable method, that is Azure AD CBA can be either Single (SF) or Multi-factor (MF) depending on the tenant configuration. Enabling CBA for a user indicates the user is potentially capable of MFA. This means a user may need additional configuration to get MFA and proof up to register other authentication methods when the user is in scope for CBA.
78
78
79
-
This can happen when:
80
-
81
-
If CBA enabled user only has a Single Factor (SF) certificate
82
-
To unblock user:
83
-
1. Use Password + SF certificate.
79
+
If CBA enabled user only has a Single Factor (SF) certificate and need MFA
80
+
1. Use Password + SF certificate.
84
81
1. Issue Temporary Access Pass (TAP)
85
82
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
86
83
87
-
If CBA enabled user but has not yet been issued a certificate
88
-
To unblock user:
84
+
If CBA enabled user has not yet been issued a certificate and need MFA
89
85
1. Issue Temporary Access Pass (TAP)
90
86
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
91
87
92
-
If CBA enabled user cannot use MF cert (such as on mobile device without smart card support)
93
-
To unblock user:
88
+
If CBA enabled user cannot use MF cert (such as on mobile device without smart card support) and need MFA
94
89
1. Issue Temporary Access Pass (TAP)
95
90
1. User Register another MFA method (when user can use MF cert)
96
91
1. Use Password + MF cert (when user can use MF cert)
97
92
1. Admin adds Phone Number to user account and allows Voice/SMS method for user
98
93
99
94
100
-
101
95
## MFA with Single-factor certificate-based authentication
102
96
103
97
Azure AD CBA can be used as a second factor to meet MFA requirements with single-factor certificates. The supported combintaions are
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-certificate-based-authentication.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ The following scenarios are supported:
66
66
67
67
The following scenarios aren't supported:
68
68
69
-
- Certificate Authority hints aren't supported, so the list of certificates that appears for users in the certificate picket UI isn't scoped.
69
+
- Certificate Authority hints aren't supported, so the list of certificates that appears for users in the certificate picker UI isn't scoped.
70
70
- Only one CRL Distribution Point (CDP) for a trusted CA is supported.
71
71
- The CDP can be only HTTP URLs. We don't support Online Certificate Status Protocol (OCSP), or Lightweight Directory Access Protocol (LDAP) URLs.
72
72
- Configuring other certificate-to-user account bindings, such as using the **Subject**, **Subject + Issuer** or **Issuer + Serial Number**, aren’t available in this release.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-methods-activity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -112,7 +112,7 @@ The registration details report shows the following information for each user:
112
112
- SSPR Registered (Registered, Not Registered)
113
113
- SSPR Enabled (Enabled, Not Enabled)
114
114
- SSPR Capable (Capable, Not Capable)
115
-
- Methods registered (Email, Mobile Phone, Alternative Mobile Phone, Office Phone, Microsoft Authenticator Push, Software One Time Passcode, FIDO2, Security Key, Security questions, Hardware OATH token)
115
+
- Methods registered (Alternate Mobile Phone, Email, FIDO2 Security Key, Hardware OATH token, Microsoft Authenticator app, Microsoft Passwordless phone sign-in, Mobile Phone, Office Phone, Security questions, Software OATH token, Temporary Access Pass, Windows Hello for Business)
116
116
117
117

Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-registration-mfa-sspr-combined.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,6 +36,9 @@ To enable combined registration, complete these steps:
36
36
37
37

38
38
39
+
> [!IMPORTANT]
40
+
> If your Azure tenant has already been enabled for combined registration, you might not see the configuration option for **Users can use the combined security information registration experience** or even see it grayed out.
41
+
39
42
> [!NOTE]
40
43
> After you enable combined registration, users who register or confirm their phone number or mobile app through the new experience can use them for Azure AD Multi-Factor Authentication and SSPR, if those methods are enabled in the Azure AD Multi-Factor Authentication and SSPR policies.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/workload-identity-federation-create-trust-user-assigned-managed-identity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -137,7 +137,7 @@ For a workflow triggered by a pull request event, specify an **Entity type** of
137
137
138
138
Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and **Name** fields:
139
139
140
-
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
140
+
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
141
141
- **Service account name** is the name of the Kubernetes service account, which provides an identity for processes that run in a Pod.
142
142
- **Namespace** is the service account namespace.
143
143
- **Name** is the name of the federated credential, which can't be changed later.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/workload-identity-federation-create-trust.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,6 @@ To add a federated identity for GitHub actions, follow these steps:
64
64
65
65
:::image type="content" source="media/workload-identity-federation-create-trust/add-credential.png" alt-text="Screenshot of the Add a credential window, showing sample values." :::
66
66
67
-
68
67
Use the following values from your Azure AD application registration for your GitHub workflow:
69
68
70
69
-`AZURE_CLIENT_ID` the **Application (client) ID**
@@ -146,7 +145,7 @@ Select the **Kubernetes accessing Azure resources** scenario from the dropdown m
146
145
147
146
Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and **Name** fields:
148
147
149
-
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
148
+
- **Cluster issuer URL** is the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster.
150
149
- **Service account name** is the name of the Kubernetes service account, which provides an identity for processes that run in a Pod.
151
150
- **Namespace** is the service account namespace.
152
151
- **Name** is the name of the federated credential, which can't be changed later.
@@ -220,7 +219,7 @@ az ad app federated-credential create --id f6475511-fd81-4965-a00e-41e7792b7b9c
220
219
221
220
### Kubernetes example
222
221
223
-
*issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
222
+
*issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
224
223
225
224
*subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
226
225
@@ -309,6 +308,7 @@ az ad app federated-credential delete --id f6475511-fd81-4965-a00e-41e7792b7b9c
309
308
::: zone pivot="identity-wif-apps-methods-powershell"
310
309
311
310
## Prerequisites
311
+
312
312
- To run the example scripts, you have two options:
313
313
- Use [Azure Cloud Shell](../../cloud-shell/overview.md), which you can open by using the **Try It** button in the upper-right corner of code blocks.
314
314
- Run scripts locally with Azure PowerShell, as described in the next section.
- *ApplicationObjectId*: the object ID of the app (not the application (client) ID) you previously registered in Azure AD.
367
-
- *Issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
367
+
- *Issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
368
368
- *Subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
369
369
- *Name* is the name of the federated credential, which can't be changed later.
370
370
- *Audience* lists the audiences that can appear in the `aud` claim of the external token.
@@ -464,7 +464,7 @@ And you get the response:
464
464
465
465
Run the following method to configure a federated identity credential on an app and create a trust relationship with a Kubernetes service account. Specify the following parameters:
466
466
467
-
- *issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/cluster-configuration.md#oidc-issuer) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
467
+
- *issuer* is your service account issuer URL (the [OIDC issuer URL](../../aks/use-oidc-issuer.md) for the managed cluster or the [OIDC Issuer URL](https://azure.github.io/azure-workload-identity/docs/installation/self-managed-clusters/oidc-issuer.html) for a self-managed cluster).
468
468
- *subject* is the subject name in the tokens issued to the service account. Kubernetes uses the following format for subject names: `system:serviceaccount:<SERVICE_ACCOUNT_NAMESPACE>:<SERVICE_ACCOUNT_NAME>`.
469
469
- *name* is the name of the federated credential, which can't be changed later.
470
470
- *audiences* lists the audiences that can appear in the external token. This field is mandatory. The recommended value is "api://AzureADTokenExchange".
Before you learn about the current state of your external collaboration, determine a security posture. Consider centralized vs. delegated control, also governance, regulatory, and compliance targets.
21
21
22
-
Learn more: [Determine your security posture for external users](1-secure-access-posture.md)
22
+
Learn more: [Determine your security posture for external access with Azure Active Directory](1-secure-access-posture.md)
23
23
24
-
Users in your organization likely collaborate with users from other organizations. Collaboration can occur with productivity applications like Microsoft 365, by email, or sharing resources with external users. The foundation of your governance plan can include:
24
+
Users in your organization likely collaborate with users from other organizations. Collaboration occurs with productivity applications like Microsoft 365, by email, or sharing resources with external users. These scenarios include users:
25
25
26
-
*Users initiating external collaboration
27
-
*Collaboration with external users and organizations
28
-
*Access granted to external users
26
+
*Initiating external collaboration
27
+
*Collaborating with external users and organizations
28
+
*Granting access to external users
29
29
30
-
## Users initiating external collaboration
30
+
## Determine who initiates external collaboration
31
31
32
-
Users seeking external collaboration know the applications needed for their work, and when access ends. Therefore, determine users with delegated permission to invite external users, create access packages, and complete access reviews.
32
+
Generally, users seeking external collaboration know the applications to use, and when access ends. Therefore, determine users with delegated permissions to invite external users, create access packages, and complete access reviews.
*[Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md)
36
+
* Microsoft 365[Audit log activities](/microsoft-365/compliance/audit-log-activities?view=o365-worldwide&preserve-view=true) - search for events and discover activities audited in Microsoft 365
37
+
*[Auditing and reporting a B2B collaboration user](../external-identities/auditing-and-reporting.md) - verify guest user access, and see records of system and user activities
38
38
39
-
## Collaboration with external users and organizations
39
+
## Enumerate guest users and organizations
40
40
41
-
External users might be Azure AD B2B users with partner-managed credentials, or external users with locally provisioned credentials. Typically, these users are a UserType of Guest. See,[B2B collaboration overview](../external-identities/what-is-b2b.md).
41
+
External users might be Azure AD B2B users with partner-managed credentials, or external users with locally provisioned credentials. Typically, these users are the Guest UserType. To learn about inviting guests users and sharing resources, see[B2B collaboration overview](../external-identities/what-is-b2b.md).
### Discover email domains and companyName property
55
55
56
-
Determine external organizations with the domain names of external user email addresses. This discovery might not be possible with consumer identity providers such as Google. We recommend you write the companyName attribute to identify external organizations.
56
+
You can determine external organizations with the domain names of external user email addresses. This discovery might not be possible with consumer identity providers. We recommend you write the companyName attribute to identify external organizations.
57
57
58
-
### Allowlist, blocklist, and entitlement management
58
+
### Use allowlist, blocklist, and entitlement management
59
59
60
-
For your organization to collaborate with, or block, specific organizations, at the tenant level, there is allowlist or blocklist. Use this feature to control B2B invitations and redemptions regardless of source (such as Microsoft Teams, SharePoint, or the Azure portal). See, [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md).
60
+
Use the allowlist or blocklist to enable your organization to collaborate with, or block, organizations at the tenant level. Control B2B invitations and redemptions regardless of source (such as Microsoft Teams, SharePoint, or the Azure portal).
61
+
62
+
See, [Allow or block invitations to B2B users from specific organizations](../external-identities/allow-deny-list.md)
61
63
62
64
If you use entitlement management, you can confine access packages to a subset of partners with the **Specific connected organizations** option, under New access packages, in Identity Governance.
63
65
64
-

66
+

65
67
66
-
## External user access
68
+
## Determine external user access
67
69
68
-
After you have an inventory of external users and organizations, determine the access to grant to these users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
70
+
With an inventory of external users and organizations, determine the access to grant to the users. You can use the Microsoft Graph API to determine Azure AD group membership or application assignment.
69
71
70
72
*[Working with groups in Microsoft Graph](/graph/api/resources/groups-overview?context=graph%2Fcontext&view=graph-rest-1.0&preserve-view=true)
71
73
*[Applications API overview](/graph/applications-concept-overview?view=graph-rest-1.0&preserve-view=true)
0 commit comments