Skip to content

Commit c9dc53c

Browse files
authored
Merge pull request #192189 from MicrosoftDocs/main
3/18 PM Publish
2 parents 107b9f8 + dc2cd2e commit c9dc53c

File tree

141 files changed

+1419
-366
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

141 files changed

+1419
-366
lines changed

appgw-waf-metrics-1-expanded.png

108 KB
Loading

appgw-waf-metrics-2-expanded.png

93.5 KB
Loading

appgw-waf-metrics-2.png

55.6 KB
Loading

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Use additional context in multifactor authentication (MFA) notifications (Preview) - Azure Active Directory
2+
title: Use additional context in Microsoft Authenticator notifications (Preview) - Azure Active Directory
33
description: Learn how to use additional context in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 02/11/2022
7+
ms.date: 03/18/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1313
---
14-
# How to use additional context in multifactor authentication (MFA) notifications (Preview) - Authentication Methods Policy
14+
# How to use additional context in Microsoft Authenticator notifications (Preview) - Authentication Methods Policy
1515

1616
This topic covers how to improve the security of user sign-in by adding application location based on IP address in Microsoft Authenticator push notifications.
1717

@@ -34,6 +34,9 @@ The additional context can be combined with [number matching](how-to-mfa-number-
3434

3535
### Policy schema changes
3636

37+
>[!NOTE]
38+
>In Graph Explorer, ensure you've consented to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
39+
3740
Identify a single target group for the schema configuration. Then use the following API endpoint to change the displayAppInformationRequiredState property to **enabled**:
3841

3942
https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 02/28/2022
7+
ms.date: 03/18/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -38,7 +38,7 @@ Number matching is available for the following scenarios. When enabled, all scen
3838
- [NPS extension](howto-mfa-nps-extension.md)
3939

4040
>[!NOTE]
41-
>For passwordless users, enabling number matching has no impact because it's already part of the passwordless experience.
41+
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
4242
4343
### Multifactor authentication
4444

@@ -126,7 +126,7 @@ You will need to change the **numberMatchingRequiredState** from **default** to
126126
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we will use **any**, but if you do not want to allow passwordless, use **push**.
127127

128128
>[!NOTE]
129-
>For passwordless users, enabling number matching has no impact because it's already part of the passwordless experience.
129+
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
130130
131131
You might need to patch the entire includeTarget to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example only shows the update to the **numberMatchingRequiredState**.
132132

articles/active-directory/develop/troubleshoot-publisher-verification.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,9 @@ One of these error messages are displayed: "A verified publisher can’t be adde
233233

234234
First, verify you've met the [publisher verification requirements](publisher-verification-overview.md#requirements).
235235

236+
> [!NOTE]
237+
> If you've met the publisher verification requirements and are still having issues, try using an existing or newly created user with similar permissions.
238+
236239
When a request to add a verified publisher is made, many signals are used to make a security risk assessment. If the request is determined to be risky an error will be returned. For security reasons, Microsoft doesn't disclose the specific criteria used to determine whether a request is risky or not. If you received this error and believe the "risky" assessment is incorrect, try waiting and resubmitting the verification request. Some customers have reported success after multiple attempts.
237240

238241
## Next steps

articles/active-directory/devices/hybrid-azuread-join-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ The following table provides details on support for these on-premises AD UPNs in
178178
| ----- | ----- | ----- | ----- |
179179
| Routable | Federated | From 1703 release | Generally available |
180180
| Non-routable | Federated | From 1803 release | Generally available |
181-
| Routable | Managed | From 1803 release | Generally available, Azure AD SSPR on Windows lock screen isn't supported. The on-premises UPN must be synced to the `onPremisesUserPrincipalName` attribute in Azure AD |
181+
| Routable | Managed | From 1803 release | Generally available, Azure AD SSPR on Windows lock screen isn't supported in environments where the on-premises UPN is different from the Azure AD UPN. The on-premises UPN must be synced to the `onPremisesUserPrincipalName` attribute in Azure AD |
182182
| Non-routable | Managed | Not supported | |
183183

184184
## Next steps

articles/active-directory/external-identities/authentication-conditional-access.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 02/07/2022
9+
ms.date: 03/21/2022
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -17,13 +17,13 @@ ms.collection: M365-identity-device-management
1717

1818
# Authentication and Conditional Access for External Identities
1919

20-
When an external user accesses resources in your organization, the authentication flow is determined by the user's identity provider (an external Azure AD tenant, social identity provider, etc.), Conditional Access policies, and the [cross-tenant access settings](cross-tenant-access-overview.md) configured both in the user's home tenant and the tenant hosting resources.
20+
When an external user accesses resources in your organization, the authentication flow is determined by the collaboration method (B2B collaboration or B2B direct connect), user's identity provider (an external Azure AD tenant, social identity provider, etc.), Conditional Access policies, and the [cross-tenant access settings](cross-tenant-access-overview.md) configured both in the user's home tenant and the tenant hosting resources.
2121

2222
This article describes the authentication flow for external users who are accessing resources in your organization. Organizations can enforce multiple Conditional Access policies for their external users, which can be enforced at the tenant, app, or individual user level in the same way that they're enabled for full-time employees and members of the organization.
2323

2424
## Authentication flow for external Azure AD users
2525

26-
The following diagram illustrates the authentication flow when an Azure AD organization shares resources with users from other Azure AD organizations. This diagram shows how cross-tenant access settings work with Conditional Access policies, such as multi-factor authentication (MFA), to determine if the user can access resources.
26+
The following diagram illustrates the authentication flow when an Azure AD organization shares resources with users from other Azure AD organizations. This diagram shows how cross-tenant access settings work with Conditional Access policies, such as multi-factor authentication (MFA), to determine if the user can access resources. This flow applies to both B2B collaboration and B2B direct connect, except as noted in step 6.
2727

2828
![Diagram illustrating the cross-tenant authentication process](media/authentication-conditional-access/cross-tenant-auth.png)
2929

@@ -34,7 +34,7 @@ The following diagram illustrates the authentication flow when an Azure AD organ
3434
|**3** | Azure AD checks Contoso’s inbound trust settings to see if Contoso trusts MFA and device claims (device compliance, hybrid Azure AD joined status) from Fabrikam. If not, skip to step 6. |
3535
|**4** | If Contoso trusts MFA and device claims from Fabrikam, Azure AD checks the user’s credentials for an indication the user has completed MFA. If Contoso trusts device information from Fabrikam, Azure AD uses the device ID to look up the device object in Fabrikam to determine its state (compliant or hybrid Azure AD joined). |
3636
|**5** | If MFA is required but not completed or if a device ID isn't provided, Azure AD issues MFA and device challenges in the user's home tenant as needed. When MFA and device requirements are satisfied in Fabrikam, the user is allowed access to the resource in Contoso. If the checks can’t be satisfied, access is blocked. |
37-
|**6** | When no trust settings are configured and MFA is required, B2B collaboration users are prompted for MFA, which they need to satisfy in the resource tenant. If device compliance is required, access is blocked. |
37+
|**6** | When no trust settings are configured and MFA is required, B2B collaboration users are prompted for MFA, which they need to satisfy in the resource tenant. Access is blocked for B2B direct connect users. If device compliance is required but can't be evaluated, access is blocked for both B2B collaboration and B2B direct connect users. |
3838

3939
For more information, see the [Conditional Access for external users](#conditional-access-for-external-users) section.
4040

@@ -70,7 +70,7 @@ The following diagram illustrates the flow when email one-time passcode authenti
7070

7171
## Conditional Access for external users
7272

73-
Organizations can enforce Conditional Access policies for external B2B collaboration users in the same way that they're enabled for full-time employees and members of the organization. This section describes important considerations for applying Conditional Access to users outside of your organization.
73+
Organizations can enforce Conditional Access policies for external B2B collaboration and B2B direct connect users in the same way that they're enabled for full-time employees and members of the organization. This section describes important considerations for applying Conditional Access to users outside of your organization.
7474

7575
### Azure AD cross-tenant trust settings for MFA and device claims
7676

0 commit comments

Comments
 (0)