Skip to content

Commit c5a5166

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into godonnell-update-gtd-portal-instructions
2 parents 11733ec + d0d8708 commit c5a5166

File tree

612 files changed

+5713
-3569
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

612 files changed

+5713
-3569
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1185,6 +1185,11 @@
11851185
"redirect_url": "/azure/role-based-access-control/change-history-report",
11861186
"redirect_document_id": true
11871187
},
1188+
{
1189+
"source_path_from_root": "/articles/active-directory/fundamentals/concept-fundamentals-mfa-get-started.md",
1190+
"redirect_url": "/azure/active-directory/authentication/concept-mfa-licensing",
1191+
"redirect_document_id": true
1192+
},
11881193
{
11891194
"source_path_from_root": "/articles/active-directory/conditional-access-azure-management.md",
11901195
"redirect_url": "/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8767,6 +8767,11 @@
87678767
"redirect_url": "/azure/developer/mobile-apps/azure-maps",
87688768
"redirect_document_id": false
87698769
},
8770+
{
8771+
"source_path_from_root": "/articles/azure-maps/choose-pricing-tier.md",
8772+
"redirect_url": "/azure/azure-maps/how-to-manage-pricing-tier",
8773+
"redirect_document_id": true
8774+
},
87708775
{
87718776
"source_path_from_root": "/articles/azure-maps/how-to-request-real-time-data.md",
87728777
"redirect_url": "/azure/azure-maps",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/managed-grafana/how-to-sync-teams-with-aad-groups.md",
5+
"redirect_url": "/azure/managed-grafana/how-to-sync-teams-with-azure-ad-groups",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 09/06/2023
4+
ms.date: 09/13/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/app-provisioning/inbound-provisioning-api-issues.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,13 @@ This document covers commonly encountered errors and issues with inbound provisi
4040

4141
**Probable causes**
4242
1. Your API-driven provisioning app is paused.
43-
1. The provisioning service is yet to update the provisioning logs with the bulk request processing details.
43+
1. The provisioning service is yet to update the provisioning logs with the bulk request processing details.
44+
2. Your On-premises provisioning agent status is inactive (If you are running the [/API-driven inbound user provisioning to on-premises Active Directory](https://go.microsoft.com/fwlink/?linkid=2245182)).
45+
4446

4547
**Resolution:**
4648
1. Verify that your provisioning app is running. If it isn't running, select the menu option **Start provisioning** to process the data.
49+
2. Turn your On-premises provisioning agent status to active by restarting the On-premise agent.
4750
1. Expect 5 to 10-minute delay between processing the request and writing to the provisioning logs. If your API client is sending data to the provisioning /bulkUpload API endpoint, then introduce a time delay between the request invocation and provisioning logs query.
4851

4952
### Forbidden 403 response code

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/12/2023
9+
ms.date: 08/23/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -19,9 +19,9 @@ ms.collection: M365-identity-device-management
1919

2020
# Authentication methods in Azure Active Directory - phone options
2121

22-
Microsoft recommends users move away from using text message or voice calls for multifactor authentication (MFA). Modern authentication methods like [Microsoft Authenticator](concept-authentication-authenticator-app.md) are a recommended alternative. For more information, see [It's Time to Hang Up on Phone Transports for Authentication](https://aka.ms/hangup). Users can still verify themselves using a mobile phone or office phone as secondary form of authentication used for multifactor authentication (MFA) or self-service password reset (SSPR).
22+
Microsoft recommends users move away from using text messages or voice calls for multifactor authentication (MFA). Modern authentication methods like [Microsoft Authenticator](concept-authentication-authenticator-app.md) are a recommended alternative. For more information, see [It's Time to Hang Up on Phone Transports for Authentication](https://aka.ms/hangup). Users can still verify themselves using a mobile phone or office phone as secondary form of authentication used for multifactor authentication (MFA) or self-service password reset (SSPR).
2323

24-
You can [configure and enable users for SMS-based authentication](howto-authentication-sms-signin.md) for direct authentication using SMS. SMS sign-in is convenient for Frontline workers. With SMS sign-in, users don't need to know a username and password to access applications and services. The user instead enters their registered mobile phone number, receives a text message with a verification code, and enters that in the sign-in interface.
24+
You can [configure and enable users for SMS-based authentication](howto-authentication-sms-signin.md) for direct authentication using text message. Text messages are convenient for Frontline workers. With text messages, users don't need to know a username and password to access applications and services. The user instead enters their registered mobile phone number, receives a text message with a verification code, and enters that in the sign-in interface.
2525

2626
>[!NOTE]
2727
>Phone call verification isn't available for Azure AD tenants with trial subscriptions. For example, if you sign up for a trial license Microsoft Enterprise Mobility and Security (EMS), phone call verification isn't available. Phone numbers must be provided in the format *+CountryCode PhoneNumber*, for example, *+1 4251234567*. There must be a space between the country/region code and the phone number.
@@ -46,10 +46,14 @@ Microsoft doesn't guarantee consistent text message or voice-based Azure AD Mult
4646

4747
With text message verification during SSPR or Azure AD Multi-Factor Authentication, a text message is sent to the mobile phone number containing a verification code. To complete the sign-in process, the verification code provided is entered into the sign-in interface.
4848

49-
Android users can enable Rich Communication Services (RCS) on their devices. RCS offers encryption and other improvements over Simple Message Service (SMS). For Android, MFA text messages may be sent over RCS rather than SMS. The experience is similar to text message, but RCS messages have more Microsoft branding and a verified checkmark so users know they can trust the message.
49+
Text messages can be sent over channels such as Short Message Service (SMS), Rich Communication Services (RCS), or WhatsApp.
50+
51+
Android users can enable RCS on their devices. RCS offers encryption and other improvements over SMS. For Android, MFA text messages may be sent over RCS rather than SMS. The MFA text message is similar to SMS, but RCS messages have more Microsoft branding and a verified checkmark so users know they can trust the message.
5052

5153
:::image type="content" source="media/concept-authentication-methods/brand.png" alt-text="Screenshot of Microsoft branding in RCS messages.":::
5254

55+
Some users with phone numbers that have country codes belonging to India, Indonesia and New Zealand may receive their verification codes via WhatsApp. Like RCS, these messages are similar to SMS, but have more Microsoft branding and a verified checkmark. Only users that have WhatsApp will receive verification codes via this channel. To determine whether a user has WhatsApp, we silently attempt delivering them a message via the app using the phone number they already registered for text message verification and see if it's successfully delivered. If users don't have any internet connectivity or uninstall WhatsApp, they'll receive their verification codes via SMS. The phone number associated with Microsoft's WhatsApp Business Agent is: *+1 (217) 302 1989*.
56+
5357
### Phone call verification
5458

5559
With phone call verification during SSPR or Azure AD Multi-Factor Authentication, an automated voice call is made to the phone number registered by the user. To complete the sign-in process, the user is prompted to press # on their keypad.
@@ -78,13 +82,13 @@ If you have problems with phone authentication for Azure AD, review the followin
7882
* Ensure that the user has their phone turned on and that service is available in their area, or use alternate method.
7983
* User is blocked
8084
* Have an Azure AD administrator unblock the user in the Azure portal.
81-
* text message is not subscribed on the device.
82-
* Have the user change methods or activate text message on the device.
83-
* Faulty telecom providers such as no phone input detected, missing DTMF tones issues, blocked caller ID on multiple devices, or blocked text messages across multiple devices.
84-
* Microsoft uses multiple telecom providers to route phone calls and text messages for authentication. If you see any of the above issues, have a user attempt to use the method at least five times within 5 minutes and have that user's information available when contacting Microsoft support.
85+
* Text messaging platforms like SMS, RCS, or WhatsApp aren't subscribed on the device.
86+
* Have the user change methods or activate a text messaging platform on the device.
87+
* Faulty telecom providers, such as when no phone input is detected, missing DTMF tones issues, blocked caller ID on multiple devices, or blocked text messages across multiple devices.
88+
* Microsoft uses multiple telecom providers to route phone calls and text messages for authentication. If you see any of these issues, have a user attempt to use the method at least five times within 5 minutes and have that user's information available when contacting Microsoft support.
8589
* Poor signal quality.
8690
* Have the user attempt to log in using a wi-fi connection by installing the Authenticator app.
87-
* Or, use text message authentication instead of phone (voice) authentication.
91+
* Or use a text message instead of phone (voice) authentication.
8892

8993
* Phone number is blocked and unable to be used for Voice MFA
9094

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -79,17 +79,17 @@ Azure AD CBA is an MFA (Multi factor authentication) capable method, that is Azu
7979
If CBA enabled user only has a Single Factor (SF) certificate and need MFA
8080
1. Use Password + SF certificate.
8181
1. Issue Temporary Access Pass (TAP)
82-
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
82+
1. Admin adds Phone Number to user account and allows Voice/text message method for user.
8383

8484
If CBA enabled user has not yet been issued a certificate and need MFA
8585
1. Issue Temporary Access Pass (TAP)
86-
1. Admin adds Phone Number to user account and allows Voice/SMS method for user.
86+
1. Admin adds Phone Number to user account and allows Voice/text message method for user.
8787

8888
If CBA enabled user cannot use MF cert (such as on mobile device without smart card support) and need MFA
8989
1. Issue Temporary Access Pass (TAP)
9090
1. User Register another MFA method (when user can use MF cert)
9191
1. Use Password + MF cert (when user can use MF cert)
92-
1. Admin adds Phone Number to user account and allows Voice/SMS method for user
92+
1. Admin adds Phone Number to user account and allows Voice/text message method for user
9393

9494

9595
## MFA with Single-factor certificate-based authentication

articles/active-directory/authentication/concept-certificate-based-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ The following images show how Azure AD CBA simplifies the customer environment b
5151
The following scenarios are supported:
5252

5353
- User sign-ins to web browser-based applications on all platforms.
54-
- User sign-ins to Office mobile apps, including Outlook, OneDrive, and so on.
54+
- User sign-ins to Office mobile apps on iOS/Android platforms as well as Office native apps in Windows, including Outlook, OneDrive, and so on.
5555
- User sign-ins on mobile native browsers.
5656
- Support for granular authentication rules for multifactor authentication by using the certificate issuer **Subject** and **policy OIDs**.
5757
- Configuring certificate-to-user account bindings by using any of the certificate fields:

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The following table provides a list of the features that are available in the va
4444
| Protect Azure AD tenant admin accounts with MFA || ● (*Azure AD Global Administrator* accounts only) ||||
4545
| Mobile app as a second factor ||||||
4646
| Phone call as a second factor | | ||||
47-
| SMS as a second factor | |||||
47+
| Text message as a second factor | |||||
4848
| Admin control over verification methods | |||||
4949
| Fraud alert | | | |||
5050
| MFA Reports | | | |||
@@ -70,7 +70,7 @@ Our recommended approach to enforce MFA is using [Conditional Access](../conditi
7070
| Configuration flexibility | || |
7171
| **Functionality** |
7272
| Exempt users from the policy | |||
73-
| Authenticate by phone call or SMS ||||
73+
| Authenticate by phone call or text message ||||
7474
| Authenticate by Microsoft Authenticator and Software tokens ||||
7575
| Authenticate by FIDO2, Windows Hello for Business, and Hardware tokens | |||
7676
| Blocks legacy authentication protocols ||||

articles/active-directory/authentication/concept-mfa-regional-opt-in.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 09/11/2023
9+
ms.date: 09/12/2023
1010

1111
author: aloom3
1212
ms.author: justinha
@@ -24,12 +24,12 @@ As a protection for our customers, Microsoft doesn't automatically support telep
2424

2525
In today's digital world, telecommunication services have become ingrained into our lives. But advancements come with a risk of fraudulent activities. International Revenue Share Fraud (IRSF) is a threat with severe financial implications that also makes using services more difficult. Let's look at IRSF fraud more in-depth.
2626

27-
IRSF is a type of telephony fraud where criminals exploit the billing system of telecommunication services providers to make profit for themselves. Bad actors gain unauthorized access to a telecommunication network and divert traffic to those networks to skim profit for every transaction that is sent to that network. To divert traffic, bad actors steal existing usernames and passwords, create new usernames and passwords, or try a host of other things to send SMS messages and voice calls through their telecommunication network. Bad actors take advantage of multifactor authentication screens, which require an SMS or voice call before a user can access their account. This activity causes exorbitant charges and makes services unreliable for our customers, causing downtime, and system errors.
27+
IRSF is a type of telephony fraud where criminals exploit the billing system of telecommunication services providers to make profit for themselves. Bad actors gain unauthorized access to a telecommunication network and divert traffic to those networks to skim profit for every transaction that is sent to that network. To divert traffic, bad actors steal existing usernames and passwords, create new usernames and passwords, or try a host of other things to send text message messages and voice calls through their telecommunication network. Bad actors take advantage of multifactor authentication screens, which require a text message or voice call before a user can access their account. This activity causes exorbitant charges and makes services unreliable for our customers, causing downtime, and system errors.
2828

2929
Here's how an IRSF attack may happen:
3030

3131
1. A bad actor first gets premium rate phone numbers and registers them.
32-
1. A bad actor uses automated scripts to request voice calls or SMS messages. The bad actor is colluding with number providers and the telecommunication network to drive more traffic to those services. The bad actor skims some of the profits of the increased traffic.
32+
1. A bad actor uses automated scripts to request voice calls or text messages. The bad actor is colluding with number providers and the telecommunication network to drive more traffic to those services. The bad actor skims some of the profits of the increased traffic.
3333
1. A bad actor will hop around different region codes to continue to drive traffic and make it hard for them to get caught.
3434

3535
The most common way to conduct IRSF is through an end-user experience that requires a two-factor authentication code. Bad actors add those premium rate phone numbers and pump traffic to them by requesting two-factor authentication codes. This activity results in revenue-skimming, and can lead to billions of dollars in loss.
@@ -46,7 +46,7 @@ For SMS verification, the following region codes require an opt-in.
4646
| 998 | Uzbek |
4747

4848
## Voice verification
49-
For Voice verification, the following region codes require an opt-in.
49+
For voice verification, the following region codes require an opt-in.
5050

5151
| Region Code | Region Name |
5252
|:----------- |:---------------------------------------------- |

0 commit comments

Comments
 (0)