Skip to content

Commit cf25c3e

Browse files
authored
Merge pull request #223111 from MicrosoftDocs/main
1/05 PM Published
2 parents eb3d879 + e551cee commit cf25c3e

File tree

997 files changed

+8534
-6760
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

997 files changed

+8534
-6760
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -755,7 +755,7 @@
755755
{
756756
"path_to_root": "azure-spring-apps-reference-architecture",
757757
"url": "https://github.com/Azure/azure-spring-apps-reference-architecture",
758-
"branch": "main",
758+
"branch": "reference-architecture",
759759
"branch_mapping": {}
760760
},
761761
{

.openpublishing.redirection.healthcare-apis.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -633,6 +633,10 @@
633633
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-iotjsonpathcontenttemplate-mappings",
634634
"redirect_document_id": false
635635
},
636+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-new-button.md",
637+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-arm",
638+
"redirect_document_id": false
639+
},
636640
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
637641
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
638642
"redirect_document_id": false

articles/active-directory-b2c/claimsschema.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ The following example configures an **email** claim with regular expression inpu
224224
<UserHelpText>Email address that can be used to contact you.</UserHelpText>
225225
<UserInputType>TextBox</UserInputType>
226226
<Restriction>
227-
<Pattern RegularExpression="^[a-zA-Z0-9.+!#$%&amp;'^_`{}~-]+@[a-zA-Z0-9-]+(?:\.[a-zA-Z0-9-]+)*$" HelpText="Please enter a valid email address." />
227+
<Pattern RegularExpression="^[a-zA-Z0-9.+!#$%&amp;'+^_`{}~-]+(?:\.[a-zA-Z0-9!#$%&amp;'+^_`{}~-]+)*@(?:[a-zA-Z0-9](?:[a-zA-Z0-9-]*[a-zA-Z0-9])?\.)+[a-zA-Z0-9](?:[a-zA-Z0-9-]*[a-zA-Z0-9])?$" HelpText="Please enter a valid email address." />
228228
</Restriction>
229229
</ClaimType>
230230
```

articles/active-directory-b2c/oauth2-technical-profile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ For identity providers that support private key JWT authentication, configure th
210210

211211
```xml
212212
<Item Key="AccessTokenEndpoint">https://contoso.com/oauth2/token</Item>
213-
<Item Key="token_endpoint_auth_method">client_secret_basic</Item>
213+
<Item Key="token_endpoint_auth_method">private_key_jwt</Item>
214214
<Item Key="token_signing_algorithm">RS256</Item>
215215
```
216216

articles/active-directory-domain-services/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure Active Directory Domain Services
33
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 11/28/2022
4+
ms.date: 01/05/2023
55
ms.service: active-directory
66
ms.subservice: domain-services
77
author: justinha

articles/active-directory/authentication/concept-certificate-based-authentication-certificateuserids.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom: has-adal-ref
1919

2020
# Certificate user IDs
2121

22-
You can add certificate user IDs to users in Azure AD can have certificate user IDs. a multivalued attribute named **certificateUserIds**. The attribute allows up to four values, and each value can be of 120-character length. It can store any value, and doesn't require email ID format. It can store non-routable User Principal Names (UPNs) like _bob@woodgrove_ or _bob@local_.
22+
Azure AD has a multivalued attribute named **certificateUserIds** on the user object that can be used in Username bindings. The attribute allows up to four values, and each value can be of 120-character length. It can store any value, and doesn't require email ID format. It can store non-routable User Principal Names (UPNs) like _bob@woodgrove_ or _bob@local_.
2323

2424
## Supported patterns for certificate user IDs
2525

articles/active-directory/authentication/concept-mfa-licensing.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,7 @@ The following table provides a list of the features that are available in the va
5959
| Access Reviews | | | | ||
6060
| Entitlements Management | | | | ||
6161
| Privileged Identity Management (PIM), just-in-time access | | | | ||
62+
| Lifecycle Workflows (preview) | | | | ||
6263

6364
## Compare multi-factor authentication policies
6465

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 12/14/2022
7+
ms.date: 01/05/2023
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -323,7 +323,7 @@ They'll see a prompt to supply a verification code. They must select their accou
323323

324324
### Can I opt out of number matching?
325325

326-
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants by February 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
326+
Yes, currently you can disable number matching. We highly recommend that you enable number matching for all users in your tenant to protect yourself from MFA fatigue attacks. Microsoft will enable number matching for all tenants starting February 27, 2023. After protection is enabled by default, users can't opt out of number matching in Microsoft Authenticator push notifications.
327327

328328
### Does number matching only apply if Microsoft Authenticator is set as the default authentication method?
329329

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 23 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -104,11 +104,11 @@ When you install the extension, you need the *Tenant ID* and admin credentials f
104104

105105
### Network requirements
106106

107-
The NPS server must be able to communicate with the following URLs over ports 80 and 443:
107+
The NPS server must be able to communicate with the following URLs over TCP port 443:
108108

109-
* *https:\//strongauthenticationservice.auth.microsoft.com*
110-
* *https:\//strongauthenticationservice.auth.microsoft.us*
111-
* *https:\//strongauthenticationservice.auth.microsoft.cn*
109+
* *https:\//strongauthenticationservice.auth.microsoft.com* (for Azure Public cloud customers).
110+
* *https:\//strongauthenticationservice.auth.microsoft.us* (for Azure Government customers).
111+
* *https:\//strongauthenticationservice.auth.microsoft.cn* (for Azure China 21Vianet customers).
112112
* *https:\//adnotifications.windowsazure.com*
113113
* *https:\//login.microsoftonline.com*
114114
* *https:\//credentials.azure.com*
@@ -157,20 +157,17 @@ There are two factors that affect which authentication methods are available wit
157157

158158
* The password encryption algorithm used between the RADIUS client (VPN, Netscaler server, or other) and the NPS servers.
159159
- **PAP** supports all the authentication methods of Azure AD Multi-Factor Authentication in the cloud: phone call, one-way text message, mobile app notification, OATH hardware tokens, and mobile app verification code.
160-
- **CHAPV2** and **EAP** support phone call and mobile app notification.
161-
162-
> [!NOTE]
163-
> When you deploy the NPS extension, use these factors to evaluate which methods are available for your users. If your RADIUS client supports PAP, but the client UX doesn't have input fields for a verification code, then phone call and mobile app notification are the two supported options.
164-
>
165-
> Also, regardless of the authentication protocol that's used (PAP, CHAP, or EAP), if your MFA method is text-based (SMS, mobile app verification code, or OATH hardware token) and requires the user to enter a code or text in the VPN client UI input field, the authentication might succeed. *But* any RADIUS attributes that are configured in the Network Access Policy are *not* forwarded to the RADIUS client (the Network Access Device, like the VPN gateway). As a result, the VPN client might have more access than you want it to have, or less access or no access.
166-
>
167-
> As a workaround, you can run the [CrpUsernameStuffing script](https://github.com/OneMoreNate/CrpUsernameStuffing) to forward RADIUS attributes that are configured in the Network Access Policy and allow MFA when the user's authentication method requires the use of a One-Time Passcode (OTP), such as SMS, a Microsoft Authenticator passcode, or a hardware FOB.
168-
160+
- **CHAPV2** and **EAP** support phone call and mobile app notification.
169161

170162
* The input methods that the client application (VPN, Netscaler server, or other) can handle. For example, does the VPN client have some means to allow the user to type in a verification code from a text or mobile app?
171163

172164
You can [disable unsupported authentication methods](howto-mfa-mfasettings.md#verification-methods) in Azure.
173165

166+
> [!NOTE]
167+
> Regardless of the authentication protocol that's used (PAP, CHAP, or EAP), if your MFA method is text-based (SMS, mobile app verification code, or OATH hardware token) and requires the user to enter a code or text in the VPN client UI input field, the authentication might succeed. *But* any RADIUS attributes that are configured in the Network Access Policy are *not* forwarded to the RADIUS client (the Network Access Device, like the VPN gateway). As a result, the VPN client might have more access than you want it to have, or less access or no access.
168+
>
169+
> As a workaround, you can run the [CrpUsernameStuffing script](https://github.com/OneMoreNate/CrpUsernameStuffing) to forward RADIUS attributes that are configured in the Network Access Policy and allow MFA when the user's authentication method requires the use of a One-Time Passcode (OTP), such as SMS, a Microsoft Authenticator passcode, or a hardware FOB.
170+
174171
### Register users for MFA
175172

176173
Before you deploy and use the NPS extension, users that are required to perform Azure AD Multi-Factor Authentication need to be registered for MFA. To test the extension as you deploy it, you also need at least one test account that is fully registered for Azure AD Multi-Factor Authentication.
@@ -413,6 +410,19 @@ A VPN server may send repeated requests to the NPS server if the timeout value i
413410

414411
For more information on why you see discarded packets in the NPS server logs, see [RADIUS protocol behavior and the NPS extension](#radius-protocol-behavior-and-the-nps-extension) at the start of this article.
415412

413+
### How do I get Microsoft Authenticator number matching to work with NPS?
414+
Make sure you run the latest version of the NPS extension. NPS extension versions beginning with 1.0.1.40 support number matching.
415+
416+
Because the NPS extension can't show a number, a user who is enabled for number matching will still be prompted to Approve/Deny. However, you can create a registry key that overrides push notifications to ask a user to enter a One-Time Passcode (OTP). The user must have an OTP authentication method registered to see this behavior. Common OTP authentication methods include the OTP available in the Authenticator app, other software tokens, and so on.
417+
418+
If the user doesn't have an OTP method registered, they'll continue to get the Approve/Deny experience. A user with number matching disabled will always see the Approve/Deny experience.
419+
420+
To create the registry key that overrides push notifications:
421+
1. On the NPS Server, open the Registry Editor.
422+
2. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureMfa.
423+
3. Set the following Key Value Pair: Key: OVERRIDE_NUMBER_MATCHING_WITH_OTP Value = TRUE
424+
4. Restart the NPS Service.
425+
416426
## Managing the TLS/SSL Protocols and Cipher Suites
417427

418428
It's recommended that older and weaker cipher suites be disabled or removed unless required by your organization. Information on how to complete this task can be found in the article, [Managing SSL/TLS Protocols and Cipher Suites for AD FS](/windows-server/identity/ad-fs/operations/manage-ssl-protocols-in-ad-fs)

articles/active-directory/azuread-dev/active-directory-authentication-libraries.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,14 @@
11
---
2-
title: Azure Active Directory Authentication Libraries | Microsoft Docs
2+
title: Azure Active Directory Authentication Libraries
33
description: The Azure AD Authentication Library (ADAL) allows client application developers to easily authenticate users to cloud or on-premises Active Directory (AD) and then obtain access tokens for securing API calls.
44
services: active-directory
55
author: rwike77
66
manager: CelesteDG
7-
87
ms.service: active-directory
98
ms.subservice: azuread-dev
109
ms.topic: reference
1110
ms.workload: identity
12-
ms.date: 12/01/2018
11+
ms.date: 12/29/2022
1312
ms.author: ryanwi
1413
ms.reviewer: saeeda, jmprieur
1514
ms.custom: aaddev
@@ -31,7 +30,7 @@ The Azure Active Directory Authentication Library (ADAL) v1.0 enables applicatio
3130
3231

3332
> [!WARNING]
34-
> Support for Active Directory Authentication Library (ADAL) will end in December, 2022. Apps using ADAL on existing OS versions will continue to work, but technical support and security updates will end. Without continued security updates, apps using ADAL will become increasingly vulnerable to the latest security attack patterns. For more information, see [Migrate apps to MSAL](..\develop\msal-migration.md).
33+
> Support for Active Directory Authentication Library (ADAL) [will end](https://aka.ms/adal-eos) in June 2023. Apps using ADAL on existing OS versions will continue to work, but technical support and security updates will end. Without continued security updates, apps using ADAL will become increasingly vulnerable to the latest security attack patterns. For more information, see [Migrate apps to MSAL](..\develop\msal-migration.md).
3534
3635
## Microsoft-supported Client Libraries
3736

0 commit comments

Comments
 (0)