Skip to content

Commit ca34279

Browse files
committed
Merge branch 'main' into release-preview-er-traffic-collector
2 parents f9d04eb + 4bc711d commit ca34279

File tree

482 files changed

+3861
-1890
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

482 files changed

+3861
-1890
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5788,6 +5788,11 @@
57885788
"redirect_url": "/azure/automation/manage-run-as-account",
57895789
"redirect_document_id": false
57905790
},
5791+
{
5792+
"source_path_from_root": "/articles/automation/quickstarts/create-account-portal.md",
5793+
"redirect_url": "/azure/automation/create-azure-automation-account-portal",
5794+
"redirect_document_id": false
5795+
},
57915796
{
57925797
"source_path_from_root": "/articles/best-practices-availability-paired-regions.md",
57935798
"redirect_url": "/azure/availability-zones/cross-region-replication-azure",
@@ -18303,6 +18308,16 @@
1830318308
"redirect_url": "/connectors/bingsearch",
1830418309
"redirect_document_id": false
1830518310
},
18311+
{
18312+
"source_path_from_root": "/articles/connectors/connectors-create-api-twilio.md",
18313+
"redirect_url": "/connectors/twilio",
18314+
"redirect_document_id": false
18315+
},
18316+
{
18317+
"source_path_from_root": "/articles/connectors/connectors-schema-migration.md",
18318+
"redirect_url": "/azure/logic-apps/update-consumption-workflow-schema",
18319+
"redirect_document_id": false
18320+
},
1830618321
{
1830718322
"source_path_from_root": "/articles/logic-apps/logic-apps-scenario-error-and-exception-handling.md",
1830818323
"redirect_url": "/azure/logic-apps/logic-apps-exception-handling",

articles/active-directory-domain-services/migrate-from-classic-vnet.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/07/2022
11+
ms.date: 08/15/2022
1212
ms.author: justinha
1313
ms.custom: devx-track-azurepowershell
1414

@@ -172,9 +172,15 @@ Before you begin the migration process, complete the following initial checks an
172172

173173
Make sure that network settings don't block necessary ports required for Azure AD DS. Ports must be open on both the Classic virtual network and the Resource Manager virtual network. These settings include route tables (although it's not recommended to use route tables) and network security groups.
174174

175-
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain. To view the ports required, see [Network security groups and required ports][network-ports].
175+
Azure AD DS needs a network security group to secure the ports needed for the managed domain and block all other incoming traffic. This network security group acts as an extra layer of protection to lock down access to the managed domain.
176176

177-
If you use secure LDAP, add a rule to the network security group to allow incoming traffic for *TCP* port *636*. For more information, see [Lock down secure LDAP access over the internet](tutorial-configure-ldaps.md#lock-down-secure-ldap-access-over-the-internet)
177+
The following network security group Inbound rules are required for the managed domain to provide authentication and management services. Don't edit or delete these network security group rules for the virtual network subnet your managed domain is deployed into.
178+
179+
| Inbound port number | Protocol | Source | Destination | Action | Required | Purpose |
180+
|:-----------:|:--------:|:----------------------------------:|:-----------:|:------:|:--------:|:--------|
181+
| 5986 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Management of your domain. |
182+
| 3389 | TCP | CorpNetSaw | Any | Allow | Optional | Debugging for support. |
183+
| 636 | TCP | AzureActiveDirectoryDomainServices | Inbound | Allow | Optional | Secure LDAP. |
178184

179185
Make a note of this target resource group, target virtual network, and target virtual network subnet. These resource names are used during the migration process.
180186

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 08/08/2022
4+
ms.date: 08/16/2022
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 19 additions & 161 deletions
Original file line numberDiff line numberDiff line change
@@ -13,193 +13,51 @@ ms.collection: M365-identity-device-management
1313
---
1414
# How to use additional context in Microsoft Authenticator app notifications (Preview) - Authentication Methods Policy
1515

16-
This article covers how to improve the security of user sign-in by adding the application and location in Microsoft Authenticator app push notifications.
16+
This topic covers how to improve the security of user sign-in by adding the application name and geographic location of the sign-in to Microsoft Authenticator push and passwordless notifications. The schema for the API to enable application name and geographic location is currently being updated. **While the API is updated over the next two weeks, you should only use the Azure AD portal to enable application name and geographic location.**
1717

1818
## Prerequisites
1919

20-
Your organization will need to enable Authenticator app push notifications for some users or groups using the new Authentication Methods Policy API.
20+
Your organization will need to enable Microsoft Authenticator push notifications for some users or groups by using the Azure AD portal. The new Authentication Methods Policy API will soon be ready as another configuration option.
2121

2222
>[!NOTE]
2323
>Additional context can be targeted to only a single group, which can be dynamic or nested. On-premises synchronized security groups and cloud-only security groups are supported for the Authentication Method Policy.
2424
2525
## Passwordless phone sign-in and multifactor authentication
2626

27-
When a user receives a Passwordless phone sign-in or MFA push notification in the Authenticator app, they'll see the name of the application that requests the approval and the location based on the IP address where the sign-in originated from.
27+
When a user receives a passwordless phone sign-in or MFA push notification in the Authenticator app, they'll see the name of the application that requests the approval and the location based on the IP address where the sign-in originated from.
2828

2929
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/location.png" alt-text="Screenshot of additional context in the MFA push notification.":::
3030

3131
The additional context can be combined with [number matching](how-to-mfa-number-match.md) to further improve sign-in security.
3232

3333
:::image type="content" border="false" source="./media/howto-authentication-passwordless-phone/location-with-number-match.png" alt-text="Screenshot of additional context with number matching in the MFA push notification.":::
3434

35-
### Policy schema changes
35+
## Enable additional context
3636

37-
>[!NOTE]
38-
>In Graph Explorer, ensure you've consented to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
37+
To enable application name or geographic location, complete the following steps:
3938

40-
Identify a single target group for the schema configuration. Then use the following API endpoint to change the displayAppInformationRequiredState property to **enabled**:
39+
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
40+
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone, and change **Authentication mode** to **Any**.
41+
42+
Only users who are enabled for Microsoft Authenticator here can be included in the policy to show the application name or geographic location of the sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see application name or geographic location.
4143

42-
https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
44+
:::image type="content" border="true" source="./media/how-to-mfa-additional-context/enable-settings-additional-context.png" alt-text="Screenshot of how to enable Microsoft Authenticator settings for Any authentication mode.":::
4345

44-
>[!NOTE]
45-
>For Passwordless phone sign-in, the Authenticator app does not retrieve policy information just in time for each sign-in request. Instead, the Authenticator app does a best effort retrieval of the policy once every 7 days. We understand this limitation is less than ideal and are working to optimize the behavior. In the meantime, if you want to force a policy update to test using additional context with Passwordless phone sign-in, you can remove and re-add the account in the Authenticator app.
46-
47-
#### MicrosoftAuthenticatorAuthenticationMethodConfiguration properties
48-
49-
**PROPERTIES**
50-
51-
| Property | Type | Description |
52-
|---------|------|-------------|
53-
| ID | String | The authentication method policy identifier. |
54-
| state | authenticationMethodState | Possible values are: **enabled**<br>**disabled** |
55-
56-
**RELATIONSHIPS**
57-
58-
| Relationship | Type | Description |
59-
|--------------|------|-------------|
60-
| includeTargets | [microsoftAuthenticatorAuthenticationMethodTarget](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) |
61-
| collection | A collection of users or groups who are enabled to use the authentication method. |
62-
63-
#### MicrosoftAuthenticator includeTarget properties
64-
65-
**PROPERTIES**
66-
67-
| Property | Type | Description |
68-
|----------|------|-------------|
69-
| authenticationMode | String | Possible values are:<br>**any**: Both passwordless phone sign-in and traditional second factor notifications are allowed.<br>**deviceBasedPush**: Only passwordless phone sign-in notifications are allowed.<br>**push**: Only traditional second factor push notifications are allowed. |
70-
| ID | String | Object ID of an Azure AD user or group. |
71-
| targetType | authenticationMethodTargetType | Possible values are: **user**, **group**.<br>You can only set one group or user for additional context. |
72-
| displayAppInformationRequiredState | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
46+
1. On the **Configure** tab, for **Show application name in push and passwordless notifications (Preview)**, change **Status** to **Enabled**, choose who to include or exclude from the policy, and click **Save**.
7347

74-
>[!NOTE]
75-
>Additional context can only be enabled for a single group.
76-
77-
#### Example of how to enable additional context for all users
78-
79-
Change the **displayAppInformationRequiredState** from **default** to **enabled**.
80-
81-
The value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we'll use **any**, but if you don't want to allow passwordless, use **push**.
82-
83-
You need to PATCH the entire includeTarget to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example only shows the update to the **displayAppInformationRequiredState**.
84-
85-
```json
86-
//Retrieve your existing policy via a GET.
87-
//Leverage the Response body to create the Request body section. Then update the Request body similar to the Request body as shown below.
88-
//Change the Query to PATCH and Run query
89-
90-
{
91-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
92-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
93-
"id": "MicrosoftAuthenticator",
94-
"state": "enabled",
95-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
96-
"includeTargets": [
97-
{
98-
"targetType": "group",
99-
"id": "all_users",
100-
"authenticationMode": "any",
101-
"displayAppInformationRequiredState": "enabled",
102-
"numberMatchingRequiredState": "enabled"
103-
}
104-
]
105-
}
106-
107-
```
108-
109-
To confirm this update has applied, run the GET request below using the endpoint below.
110-
GET - https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
111-
112-
113-
#### Example of how to enable additional context for a single group
114-
115-
Change the **displayAppInformationRequiredState** value from **default** to **enabled.**
116-
Change the **id** from **all_users** to the ObjectID of the group from the Azure AD portal.
117-
118-
You need to PATCH the entire includeTarget to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The example below only shows the update to the **displayAppInformationRequiredState**.
119-
120-
```json
121-
//Copy paste the below in the Request body section as shown below.
122-
//Leverage the Response body to create the Request body section. Then update the Request body similar to the Request body as shown below.
123-
//Change query to PATCH and run query
124-
125-
{
126-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
127-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
128-
"id": "MicrosoftAuthenticator",
129-
"state": "enabled",
130-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
131-
"includeTargets": [
132-
{
133-
"targetType": "group",
134-
"id": "1ca44590-e896-4dbe-98ed-b140b1e7a53a",
135-
"authenticationMode": "any",
136-
"displayAppInformationRequiredState": "enabled",
137-
"numberMatchingRequiredState": "enabled"
138-
}
139-
]
140-
}
141-
```
142-
143-
To verify, RUN GET again and verify the ObjectID
144-
GET https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator
145-
146-
147-
#### Example of error when enabling additional context for multiple groups
148-
149-
The PATCH request will fail with 400 Bad Request and the error will contain the following message:
150-
151-
`Persistance of policy failed with error: You cannot enable multiple targets for feature 'Require Display App Information'. Choose only one of the following includeTargets to enable: aede0efe-c1b4-40dc-8ae7-2c402f23e312,aede0efe-c1b4-40dc-8ae7-2c402f23e317.`
152-
153-
### Test the end-user experience
154-
Add the test user account to the Authenticator app. The account **doesn't** need to be enabled for phone sign-in.
155-
156-
See the end-user experience of an Authenticator multifactor authentication push notification with additional context by signing into aka.ms/MFAsetup.
157-
158-
### Turn off additional context
159-
160-
To turn off additional context, you'll need to PATCH remove **displayAppInformationRequiredState** from **enabled** to **disabled**/**default**.
161-
162-
```json
163-
{
164-
"@odata.context": "https://graph.microsoft.com/beta/$metadata#authenticationMethodConfigurations/$entity",
165-
"@odata.type": "#microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration",
166-
"id": "MicrosoftAuthenticator",
167-
"state": "enabled",
168-
"[email protected]": "https://graph.microsoft.com/beta/$metadata#authenticationMethodsPolicy/authenticationMethodConfigurations('MicrosoftAuthenticator')/microsoft.graph.microsoftAuthenticatorAuthenticationMethodConfiguration/includeTargets",
169-
"includeTargets": [
170-
{
171-
"targetType": "group",
172-
"id": "all_users",
173-
"authenticationMode": "any",
174-
"displayAppInformationRequiredState": "enabled",
175-
"numberMatchingRequiredState": "default"
176-
}
177-
]
178-
}
179-
```
180-
181-
## Enable additional context in the portal
182-
183-
To enable additional context in the Azure AD portal, complete the following steps:
184-
185-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with *global administrator* permissions.
186-
1. Search for and select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
187-
1. Under the **Manage** menu header, select **Authentication methods** > **Policies**.
188-
1. From the list of available authentication methods, select **Microsoft Authenticator**.
189-
190-
![Screenshot that shows how to select the Microsoft Authenticator policy.](./media/how-to-mfa-additional-context/select-microsoft-authenticator-policy.png)
191-
192-
1. Select the target users, select the three dots on the right, and choose **Configure**.
193-
194-
![Screenshot of configuring Microsoft authenticator additional context.](./media/how-to-mfa-additional-context/configure-microsoft-authenticator.png)
48+
:::image type="content" border="true" source="./media/how-to-mfa-additional-context/enable-app-name.png" alt-text="Screenshot of how to enable application name.":::
49+
50+
Then do the same for **Show geographic location in push and passwordless notifications (Preview)**.
51+
52+
:::image type="content" border="true" source="./media/how-to-mfa-additional-context/enable-geolocation.png" alt-text="Screenshot of how to enable geographic location.":::
19553

196-
1. Select the **Authentication mode**, and then for **Show additional context in notifications (Preview)**, select **Enable**, and then select **Done**.
54+
You can configure application name and geographic location separately. For example, the following policy enables application name and geographic location for all users but excludes the Operations group from seeing geographic location.
19755

198-
![Screenshot of enabling additional context.](media/howto-authentication-passwordless-phone/enable-additional-context.png)
56+
:::image type="content" border="true" source="./media/how-to-mfa-additional-context/exclude.png" alt-text="Screenshot of how to enable application name and geographic location separately.":::
19957

20058
## Known issues
20159

202-
Additional context isn't supported for Network Policy Server (NPS).
60+
Additional context is not supported for Network Policy Server (NPS) or Active Directory Federation Services (AD FS).
20361

20462
## Next steps
20563

0 commit comments

Comments
 (0)