You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-additional-context.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,17 @@
1
1
---
2
-
title: Use additional context in multifactor authentication (MFA) notifications (Preview) - Azure Active Directory
2
+
title: Use additional context in Microsoft Authenticator notifications (Preview) - Azure Active Directory
3
3
description: Learn how to use additional context in MFA notifications
4
4
ms.service: active-directory
5
5
ms.subservice: authentication
6
6
ms.topic: conceptual
7
-
ms.date: 02/11/2022
7
+
ms.date: 03/18/2022
8
8
ms.author: justinha
9
9
author: mjsantani
10
10
ms.collection: M365-identity-device-management
11
11
12
12
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
13
13
---
14
-
# How to use additional context in multifactor authentication (MFA) notifications (Preview) - Authentication Methods Policy
14
+
# How to use additional context in Microsoft Authenticator notifications (Preview) - Authentication Methods Policy
15
15
16
16
This topic covers how to improve the security of user sign-in by adding application location based on IP address in Microsoft Authenticator push notifications.
17
17
@@ -34,6 +34,9 @@ The additional context can be combined with [number matching](how-to-mfa-number-
34
34
35
35
### Policy schema changes
36
36
37
+
>[!NOTE]
38
+
>In Graph Explorer, ensure you've consented to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
39
+
37
40
Identify a single target group for the schema configuration. Then use the following API endpoint to change the displayAppInformationRequiredState property to **enabled**:
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-number-match.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
4
4
ms.service: active-directory
5
5
ms.subservice: authentication
6
6
ms.topic: conceptual
7
-
ms.date: 02/28/2022
7
+
ms.date: 03/18/2022
8
8
ms.author: justinha
9
9
author: mjsantani
10
10
ms.collection: M365-identity-device-management
@@ -38,7 +38,7 @@ Number matching is available for the following scenarios. When enabled, all scen
38
38
-[NPS extension](howto-mfa-nps-extension.md)
39
39
40
40
>[!NOTE]
41
-
>For passwordless users, enabling number matching has no impact because it's already part of the passwordless experience.
41
+
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
42
42
43
43
### Multifactor authentication
44
44
@@ -126,7 +126,7 @@ You will need to change the **numberMatchingRequiredState** from **default** to
126
126
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we will use **any**, but if you do not want to allow passwordless, use **push**.
127
127
128
128
>[!NOTE]
129
-
>For passwordless users, enabling number matching has no impact because it's already part of the passwordless experience.
129
+
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
130
130
131
131
You might need to patch the entire includeTarget to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example only shows the update to the **numberMatchingRequiredState**.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/troubleshoot-publisher-verification.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -233,6 +233,9 @@ One of these error messages are displayed: "A verified publisher can’t be adde
233
233
234
234
First, verify you've met the [publisher verification requirements](publisher-verification-overview.md#requirements).
235
235
236
+
> [!NOTE]
237
+
> If you've met the publisher verification requirements and are still having issues, try using an existing or newly created user with similar permissions.
238
+
236
239
When a request to add a verified publisher is made, many signals are used to make a security risk assessment. If the request is determined to be risky an error will be returned. For security reasons, Microsoft doesn't disclose the specific criteria used to determine whether a request is risky or not. If you received this error and believe the "risky" assessment is incorrect, try waiting and resubmitting the verification request. Some customers have reported success after multiple attempts.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/hybrid-azuread-join-plan.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -178,7 +178,7 @@ The following table provides details on support for these on-premises AD UPNs in
178
178
| ----- | ----- | ----- | ----- |
179
179
| Routable | Federated | From 1703 release | Generally available |
180
180
| Non-routable | Federated | From 1803 release | Generally available |
181
-
| Routable | Managed | From 1803 release | Generally available, Azure AD SSPR on Windows lock screen isn't supported. The on-premises UPN must be synced to the `onPremisesUserPrincipalName` attribute in Azure AD |
181
+
| Routable | Managed | From 1803 release | Generally available, Azure AD SSPR on Windows lock screen isn't supported in environments where the on-premises UPN is different from the Azure AD UPN. The on-premises UPN must be synced to the `onPremisesUserPrincipalName` attribute in Azure AD |
# Authentication and Conditional Access for External Identities
19
19
20
-
When an external user accesses resources in your organization, the authentication flow is determined by the user's identity provider (an external Azure AD tenant, social identity provider, etc.), Conditional Access policies, and the [cross-tenant access settings](cross-tenant-access-overview.md) configured both in the user's home tenant and the tenant hosting resources.
20
+
When an external user accesses resources in your organization, the authentication flow is determined by the collaboration method (B2B collaboration or B2B direct connect), user's identity provider (an external Azure AD tenant, social identity provider, etc.), Conditional Access policies, and the [cross-tenant access settings](cross-tenant-access-overview.md) configured both in the user's home tenant and the tenant hosting resources.
21
21
22
22
This article describes the authentication flow for external users who are accessing resources in your organization. Organizations can enforce multiple Conditional Access policies for their external users, which can be enforced at the tenant, app, or individual user level in the same way that they're enabled for full-time employees and members of the organization.
23
23
24
24
## Authentication flow for external Azure AD users
25
25
26
-
The following diagram illustrates the authentication flow when an Azure AD organization shares resources with users from other Azure AD organizations. This diagram shows how cross-tenant access settings work with Conditional Access policies, such as multi-factor authentication (MFA), to determine if the user can access resources.
26
+
The following diagram illustrates the authentication flow when an Azure AD organization shares resources with users from other Azure AD organizations. This diagram shows how cross-tenant access settings work with Conditional Access policies, such as multi-factor authentication (MFA), to determine if the user can access resources. This flow applies to both B2B collaboration and B2B direct connect, except as noted in step 6.
27
27
28
28

29
29
@@ -34,7 +34,7 @@ The following diagram illustrates the authentication flow when an Azure AD organ
34
34
|**3**| Azure AD checks Contoso’s inbound trust settings to see if Contoso trusts MFA and device claims (device compliance, hybrid Azure AD joined status) from Fabrikam. If not, skip to step 6. |
35
35
|**4**| If Contoso trusts MFA and device claims from Fabrikam, Azure AD checks the user’s credentials for an indication the user has completed MFA. If Contoso trusts device information from Fabrikam, Azure AD uses the device ID to look up the device object in Fabrikam to determine its state (compliant or hybrid Azure AD joined). |
36
36
|**5**| If MFA is required but not completed or if a device ID isn't provided, Azure AD issues MFA and device challenges in the user's home tenant as needed. When MFA and device requirements are satisfied in Fabrikam, the user is allowed access to the resource in Contoso. If the checks can’t be satisfied, access is blocked. |
37
-
|**6**| When no trust settings are configured and MFA is required, B2B collaboration users are prompted for MFA, which they need to satisfy in the resource tenant. If device compliance is required, access is blocked. |
37
+
|**6**| When no trust settings are configured and MFA is required, B2B collaboration users are prompted for MFA, which they need to satisfy in the resource tenant. Access is blocked for B2B direct connect users. If device compliance is required but can't be evaluated, access is blocked for both B2B collaboration and B2B direct connect users. |
38
38
39
39
For more information, see the [Conditional Access for external users](#conditional-access-for-external-users) section.
40
40
@@ -70,7 +70,7 @@ The following diagram illustrates the flow when email one-time passcode authenti
70
70
71
71
## Conditional Access for external users
72
72
73
-
Organizations can enforce Conditional Access policies for external B2B collaboration users in the same way that they're enabled for full-time employees and members of the organization. This section describes important considerations for applying Conditional Access to users outside of your organization.
73
+
Organizations can enforce Conditional Access policies for external B2B collaboration and B2B direct connect users in the same way that they're enabled for full-time employees and members of the organization. This section describes important considerations for applying Conditional Access to users outside of your organization.
74
74
75
75
### Azure AD cross-tenant trust settings for MFA and device claims
0 commit comments