Skip to content

Commit cfbc8db

Browse files
authored
Merge pull request #77463 from MicrosoftDocs/master
5/21 PM Publish
2 parents 59fd8dc + 57ecd6e commit cfbc8db

File tree

210 files changed

+2995
-2084
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

210 files changed

+2995
-2084
lines changed

articles/active-directory-b2c/active-directory-b2c-get-started-custom.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -71,15 +71,9 @@ Azure AD B2C requires you to register two applications that are used to sign up
7171
3. Select **New application registration**.
7272
4. For **Name**, enter `IdentityExperienceFramework`.
7373
5. For **Application type**, choose **Web app/API**.
74-
6. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name.
74+
6. For **Sign-on URL**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant domain name. All URLs should now be using [b2clogin.com](b2clogin.md).
7575
7. Click **Create**. After it's created, copy the application ID and save it to use later.
7676

77-
```
78-
https://your--B2C-tenant-name.b2clogin.com/your-B2C-tenant-name.onmicrosoft.com
79-
```
80-
81-
All URLs should now be using [b2clogin.com](b2clogin.md).
82-
8377
### Register the ProxyIdentityExperienceFramework application
8478

8579
1. In **App registrations (Legacy)**, select **New application registration**.

articles/active-directory/authentication/howto-mfa-nps-extension-advanced.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,15 +37,15 @@ To troubleshoot problems with alternate login IDs, use the recommended steps for
3737

3838
## IP exceptions
3939

40-
If you need to monitor server availability, like if load balancers verify which servers are running before sending workloads, you don't want these checks to be blocked by verification requests. Instead, create a list of IP addresses that you know are used by service accounts, and disable Multi-Factor Authentication requirements for that list.
40+
If you need to monitor server availability, like if load balancers verify which servers are running before sending workloads, you don't want these checks to be blocked by verification requests. Instead, create a list of IP addresses that you know are used by service accounts, and disable Multi-Factor Authentication requirements for that list.
4141

42-
To configure an IP whitelist, go to `HKLM\SOFTWARE\Microsoft\AzureMfa` and configure the following registry value:
42+
To configure an IP allowed list, go to `HKLM\SOFTWARE\Microsoft\AzureMfa` and configure the following registry value:
4343

4444
| Name | Type | Default value | Description |
4545
| ---- | ---- | ------------- | ----------- |
4646
| IP_WHITELIST | string | Empty | Provide a semi-colon separated list of IP addresses. Include the IP addresses of machines where service requests originate, like the NAS/VPN server. IP ranges and subnets are not supported. <br><br> For example, *10.0.0.1;10.0.0.2;10.0.0.3*.
4747

48-
When a request comes in from an IP address that exists in the whitelist, two-step verification is skipped. The IP whitelist is compared to the IP address that is provided in the *ratNASIPAddress* attribute of the RADIUS request. If a RADIUS request comes in without the ratNASIPAddress attribute, the following warning is logged: "P_WHITE_LIST_WARNING::IP Whitelist is being ignored as source IP is missing in RADIUS request in NasIpAddress attribute."
48+
When a request comes in from an IP address that exists in the `IP_WHITELIST`, two-step verification is skipped. The IP list is compared to the IP address that is provided in the *ratNASIPAddress* attribute of the RADIUS request. If a RADIUS request comes in without the ratNASIPAddress attribute, the following warning is logged: "P_WHITE_LIST_WARNING::IP Whitelist is being ignored as source IP is missing in RADIUS request in NasIpAddress attribute."
4949

5050
## Next steps
5151

articles/active-directory/authentication/howto-mfaserver-adfs-2.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ You enabled IIS authentication, but to perform the pre-authentication to your Ac
8282
3. If users enter their username in “domain\username” format, the Server needs to be able to strip the domain off the username when it creates the LDAP query. That can be done through a registry setting.
8383
4. Open the registry editor and go to HKEY_LOCAL_MACHINE/SOFTWARE/Wow6432Node/Positive Networks/PhoneFactor on a 64-bit server. If on a 32-bit server, take the “Wow6432Node” out of the path. Create a DWORD registry key called “UsernameCxz_stripPrefixDomain” and set the value to 1. Azure Multi-Factor Authentication is now securing the AD FS proxy.
8484

85-
Ensure that users have been imported from Active Directory into the Server. See the [Trusted IPs section](#trusted-ips) if you would like to whitelist internal IP addresses so that two-step verification is not required when signing in to the website from those locations.
85+
Ensure that users have been imported from Active Directory into the Server. See the [Trusted IPs section](#trusted-ips) if you would like to allow internal IP addresses so that two-step verification is not required when signing in to the website from those locations.
8686

8787
![Registry editor to configure company settings](./media/howto-mfaserver-adfs-2/reg.png)
8888

@@ -106,15 +106,17 @@ You can secure AD FS when the AD FS proxy is not used. Install the Azure Multi-F
106106

107107
Azure Multi-Factor Authentication is now securing AD FS.
108108

109-
Ensure that users have been imported from Active Directory into the Server. See the Trusted IPs section if you would like to whitelist internal IP addresses so that two-step verification is not required when signing in to the website from those locations.
109+
Ensure that users have been imported from Active Directory into the Server. See the Trusted IPs section if you would like to allow internal IP addresses so that two-step verification is not required when signing in to the website from those locations.
110110

111111
## Trusted IPs
112+
112113
Trusted IPs allow users to bypass Azure Multi-Factor Authentication for website requests originating from specific IP addresses or subnets. For example, you may want to exempt users from two-step verification when they sign in from the office. For this, you would specify the office subnet as a Trusted IPs entry.
113114

114115
### To configure trusted IPs
116+
115117
1. In the IIS Authentication section, click the **Trusted IPs** tab.
116118
2. Click the **Add…** button.
117119
3. When the Add Trusted IPs dialog box appears, select one of the **Single IP**, **IP range**, or **Subnet** radio buttons.
118-
4. Enter the IP address, range of IP addresses, or subnet that should be whitelisted. If entering a subnet, select the appropriate Netmask and click the **OK** button. The trusted IP has now been added.
120+
4. Enter the IP address, range of IP addresses, or subnet that should be allowed. If entering a subnet, select the appropriate Netmask and click the **OK** button.
119121

120122
![Configure trusted IPs to MFA Server](./media/howto-mfaserver-adfs-2/trusted.png)

articles/active-directory/authentication/howto-mfaserver-iis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,4 +73,4 @@ The Trusted IPs allows users to bypass Azure Multi-Factor Authentication for web
7373
1. In the IIS Authentication section, click the **Trusted IPs** tab.
7474
2. Click **Add**.
7575
3. When the Add Trusted IPs dialog box appears, select the **Single IP**, **IP range**, or **Subnet** radio button.
76-
4. Enter the IP address, range of IP addresses or subnet that should be whitelisted. If entering a subnet, select the appropriate Netmask and click **OK**. The whitelist has now been added.
76+
4. Enter the IP address, range of IP addresses or subnet that should be allowed. If entering a subnet, select the appropriate Netmask and click **OK**.

articles/active-directory/authentication/overview-authentication.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,10 @@ Self-service password reset includes:
4949

5050
Azure Multi-Factor Authentication (MFA) is Microsoft's two-step verification solution. Using administrator approved authentication methods, Azure MFA helps safeguard your access to data and applications, while meeting the demand for a simple sign-in process.
5151

52+
## License requirements
53+
54+
[!INCLUDE [Active Directory P1 license](../../../includes/active-directory-p1-license.md)]
55+
5256
## Next steps
5357

5458
The next step is to dive in and configure self-service password reset and Azure Multi-Factor Authentication.

articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The Azure AD default for browser session persistence allows users on personal de
4747

4848
## Configuring authentication session controls
4949

50-
Conditional access is an Azure AD Premium capability and requires a premium license. If you would like to learn more about conditional access, see [What is conditional access in Azure Active Directory?](overview.md#license-requirements-for-using-conditional-access)
50+
Conditional access is an Azure AD Premium capability and requires a premium license. If you would like to learn more about conditional access, see [What is conditional access in Azure Active Directory?](overview.md#license-requirements)
5151

5252
> [!WARNING]
5353
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on October 15 and replace it with the conditional access authentication session management feature.

articles/active-directory/conditional-access/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,9 +84,9 @@ When the configured conditional access policy requires multi-factor authenticati
8484

8585
After the user has signed in to the federated authentication service, Azure AD handles other policy requirements such as device compliance or an approved application.
8686

87-
## License requirements for using conditional access
87+
## License requirements
8888

89-
Using conditional access requires an Azure AD Premium license. To find the right license for your requirements, see [Comparing generally available features of the Free, Basic, and Premium editions](https://azure.microsoft.com/pricing/details/active-directory/).
89+
[!INCLUDE [Active Directory P1 license](../../../includes/active-directory-p1-license.md)]
9090

9191
## Next steps
9292

articles/active-directory/develop/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,10 @@ abstract:
2020
image:
2121
alt:
2222
height: 110
23-
src: ./media/index/video-featured.png
23+
src: ./media/index/identity-platform-thumbnail.png
2424
width: 250
25-
title: Building web app solutions with authentication (9:31)
26-
href: https://www.youtube.com/watch?v=QWh5HZK9vRA
25+
title: Microsoft identity platform overview (2:20)
26+
href: https://youtu.be/y_fgJAatVhk
2727
width: 250
2828
sections:
2929

168 KB
Loading

0 commit comments

Comments
 (0)