Skip to content

Commit cba1fef

Browse files
authored
Merge pull request #223188 from MicrosoftDocs/main
1/06 AM Publish
2 parents 8422ce1 + dd7c749 commit cba1fef

File tree

52 files changed

+353
-300
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

52 files changed

+353
-300
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1942,8 +1942,8 @@
19421942
},
19431943
{
19441944
"source_path_from_root": "/articles/active-directory/active-directory-b2b-add-user-without-invite.md",
1945-
"redirect_url": "/azure/active-directory/b2b/add-user-without-invite",
1946-
"redirect_document_id": true
1945+
"redirect_url": "/azure/active-directory/external-identities/redemption-experience",
1946+
"redirect_document_id": false
19471947
},
19481948
{
19491949
"source_path_from_root": "/articles/active-directory/active-directory-b2b-allow-deny-list.md",
@@ -3908,8 +3908,8 @@
39083908
},
39093909
{
39103910
"source_path_from_root": "/articles/active-directory/b2b/add-user-without-invite.md",
3911-
"redirect_url": "/azure/active-directory/external-identities/add-user-without-invite",
3912-
"redirect_document_id": true
3911+
"redirect_url": "/azure/active-directory/external-identities/redemption-experience",
3912+
"redirect_document_id": false
39133913
},
39143914
{
39153915
"source_path_from_root": "/articles/active-directory/b2b/allow-deny-list.md",
@@ -4089,7 +4089,7 @@
40894089
{
40904090
"source_path_from_root": "/articles/active-directory/b2b/redemption-experience.md",
40914091
"redirect_url": "/azure/active-directory/external-identities/redemption-experience",
4092-
"redirect_document_id": true
4092+
"redirect_document_id": false
40934093
},
40944094
{
40954095
"source_path_from_root": "/articles/active-directory/b2b/self-service-portal.md",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1163,6 +1163,11 @@
11631163
"redirect_url": "/azure",
11641164
"redirect_document_id": false
11651165
},
1166+
{
1167+
"source_path_from_root": "/articles/active-directory/external-identities/add-user-without-invite.md",
1168+
"redirect_url": "/azure/active-directory/external-identities/redemption-experience",
1169+
"redirect_document_id": true
1170+
},
11661171
{
11671172
"source_path_from_root": "/articles/active-directory-b2c/active-directory-b2c-landing-custom.md",
11681173
"redirect_url": "/azure/active-directory-b2c",

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 01/05/2023
7+
ms.date: 01/06/2023
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -85,7 +85,7 @@ To create the registry key that overrides push notifications:
8585
Value = TRUE
8686
1. Restart the NPS Service.
8787

88-
If you're using Remote Desktop Gateway, the user account must be configured for phone verification, or Microsoft Authenticator push notifications. If neither option is configured, the user won't be able to meet the Azure AD MFA challenge, and Remote Desktop Gateway sign-in will fail. In this case, you can set OVERRIDE_NUMBER_MATCHING_WITH_OTP = FALSE.
88+
If you're using Remote Desktop Gateway and the user is registered for OTP code along with Microsoft Authenticator push notifications, the user won't be able to meet the Azure AD MFA challenge and Remote Desktop Gateway sign-in will fail. In this case, you can set OVERRIDE_NUMBER_MATCHING_WITH_TOP = FALSE to fall back to push notifications with Microsoft Authenticator.
8989

9090
### Apple Watch supported for Microsoft Authenticator
9191

@@ -323,7 +323,7 @@ They'll see a prompt to supply a verification code. They must select their accou
323323

324324
### Can I opt out of number matching?
325325

326-
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants starting February 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
326+
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. To protect the ecosystem and mitigate these threats, Microsoft will enable number matching for all tenants starting February 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
327327

328328
### Does number matching only apply if Microsoft Authenticator is set as the default authentication method?
329329

articles/active-directory/conditional-access/howto-conditional-access-policy-risk-user.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 08/22/2022
9+
ms.date: 01/06/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -39,7 +39,7 @@ Organizations can choose to deploy this policy using the steps outlined below or
3939
1. Under **Configure user risk levels needed for policy to be enforced**, select **High**.
4040
1. Select **Done**.
4141
1. Under **Access controls** > **Grant**.
42-
1. Select **Grant access**, **Require password change**.
42+
1. Select **Grant access**, **Require multifactor authentication** and **Require password change**.
4343
1. Select **Select**.
4444
1. Under **Session**.
4545
1. Select **Sign-in frequency**.

articles/active-directory/develop/workload-identity-federation-create-trust-gcp.md

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Access Azure resources from Google Cloud without credentials
33
description: Access Azure AD protected resources from a service running in Google Cloud without using secrets or certificates. Use workload identity federation to set up a trust relationship between an app in Azure AD and an identity in Google Cloud. The workload running in Google Cloud can get an access token from Microsoft identity platform and access Azure AD protected resources.
44
services: active-directory
5-
author: rwike77
5+
author: OwenRichards1
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 08/07/2022
13-
ms.author: ryanwi
12+
ms.date: 01/06/2023
13+
ms.author: owenrichards
1414
ms.custom: aaddev
1515
ms.reviewer: udayh
1616
#Customer intent: As an application developer, I want to create a trust relationship with a Google Cloud identity so my service in Google Cloud can access Azure AD protected resources without managing secrets.
@@ -206,32 +206,32 @@ class ClientAssertionCredential implements TokenCredential {
206206

207207
// Get the ID token from Google.
208208
return getGoogleIDToken() // calling this directly just for clarity,
209-
// this should be a callback
210-
// pass this as a client assertion to the confidential client app
211-
.then((clientAssertion:any)=> {
212-
var msalApp: any;
213-
msalApp = new msal.ConfidentialClientApplication({
214-
auth: {
215-
clientId: this.clientID,
216-
authority: this.aadAuthority + this.tenantID,
217-
clientAssertion: clientAssertion,
218-
}
209+
210+
let aadAudience = "api://AzureADTokenExchange"
211+
const jwt = axios({
212+
url: "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/default/identity?audience="
213+
+ aadAudience,
214+
method: "GET",
215+
headers: {
216+
"Metadata-Flavor": "Google"
217+
}}).then(response => {
218+
console.log("AXIOS RESPONSE");
219+
return response.data;
220+
});
221+
return jwt;
222+
.then(function(aadToken) {
223+
// return in form expected by TokenCredential.getToken
224+
let returnToken = {
225+
token: aadToken.accessToken,
226+
expiresOnTimestamp: aadToken.expiresOn.getTime(),
227+
};
228+
return (returnToken);
229+
})
230+
.catch(function(error) {
231+
// error stuff
219232
});
220-
return msalApp.acquireTokenByClientCredential({ scopes })
221-
})
222-
.then(function(aadToken) {
223-
// return in form expected by TokenCredential.getToken
224-
let returnToken = {
225-
token: aadToken.accessToken,
226-
expiresOnTimestamp: aadToken.expiresOn.getTime(),
227-
};
228-
return (returnToken);
229-
})
230-
.catch(function(error) {
231-
// error stuff
232-
});
233+
}
233234
}
234-
}
235235
export default ClientAssertionCredential;
236236
```
237237

articles/active-directory/external-identities/add-user-without-invite.md

Lines changed: 0 additions & 40 deletions
This file was deleted.

articles/active-directory/external-identities/customize-invitation-api.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,3 +130,4 @@ Check out the invitation API reference in [https://developer.microsoft.com/graph
130130
- [What is Azure AD B2B collaboration?](what-is-b2b.md)
131131
- [Add and invite guest users](add-users-administrator.md)
132132
- [The elements of the B2B collaboration invitation email](invitation-email-elements.md)
133+

articles/active-directory/external-identities/external-collaboration-settings-configure.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,5 +98,4 @@ When a B2B user signs into a resource tenant to collaborate, a sign-in log is ge
9898
See the following articles on Azure AD B2B collaboration:
9999

100100
- [What is Azure AD B2B collaboration?](what-is-b2b.md)
101-
- [Add B2B collaboration guest users without an invitation](add-user-without-invite.md)
102101
- [Adding a B2B collaboration user to a role](./add-users-administrator.md)

articles/active-directory/external-identities/invitation-email-elements.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717

1818
# The elements of the B2B collaboration invitation email - Azure Active Directory
1919

20-
Invitation emails are a critical component to bring partners on board as B2B collaboration users in Azure AD. It’s [not required that you send an email to invite someone using B2B collaboration](add-user-without-invite.md), but it gives the user all the information they need to decide if they accept your invite or not. It also gives them a link they can always refer to in the future when they need to return to your resources.
20+
Invitation emails are a critical component to bring partners on board as B2B collaboration users in Azure AD. It’s [not required that you send an email to invite someone using B2B collaboration](redemption-experience.md#redemption-through-a-direct-link), but it gives the user all the information they need to decide if they accept your invite or not. It also gives them a link they can always refer to in the future when they need to return to your resources.
2121

2222
![Screenshot showing the B2B invitation email](media/invitation-email-elements/invitation-email.png)
2323

@@ -100,4 +100,3 @@ See the following articles on Azure AD B2B collaboration:
100100
- [How do Azure Active Directory admins add B2B collaboration users?](add-users-administrator.md)
101101
- [How do information workers add B2B collaboration users?](add-users-information-worker.md)
102102
- [B2B collaboration invitation redemption](redemption-experience.md)
103-
- [Add B2B collaboration users without an invitation](add-user-without-invite.md)

articles/active-directory/external-identities/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,8 +111,6 @@
111111
href: add-users-information-worker.md
112112
- name: Invite internal users to B2B
113113
href: invite-internal-users.md
114-
- name: Add B2B users without an invitation
115-
href: add-user-without-invite.md
116114
- name: Customize invitations using API
117115
href: customize-invitation-api.md
118116
- name: Add self-service sign-up for guest users

0 commit comments

Comments
 (0)