Skip to content

Commit d19812c

Browse files
authored
Merge branch 'MicrosoftDocs:main' into Broken-link-sidandrews
2 parents 572b081 + c1b1ef6 commit d19812c

File tree

156 files changed

+2627
-676
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

156 files changed

+2627
-676
lines changed

articles/active-directory-b2c/add-password-reset-policy.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,8 @@ Declare your claims in the [claims schema](claimsschema.md). Open the extensions
130130
</BuildingBlocks> -->
131131
```
132132

133-
A claims transformation technical profile initiates the **isForgotPassword** claim. The technical profile is referenced later. When invoked, it sets the value of the **isForgotPassword** claim to `true`. Find the **ClaimsProviders** element. If the element doesn't exist, add it. Then add the following claims provider:
133+
### Add the technical profiles
134+
A claims transformation technical profile accesses the `isForgotPassword` claim. The technical profile is referenced later. When it's invoked, it sets the value of the `isForgotPassword` claim to `true`. Find the **ClaimsProviders** element (if the element doesn't exist, create it), and then add the following claims provider:
134135

135136
```xml
136137
<!--
@@ -151,6 +152,9 @@ A claims transformation technical profile initiates the **isForgotPassword** cla
151152
<Item Key="setting.forgotPasswordLinkOverride">ForgotPasswordExchange</Item>
152153
</Metadata>
153154
</TechnicalProfile>
155+
<TechnicalProfile Id="LocalAccountWritePasswordUsingObjectId">
156+
<UseTechnicalProfileForSessionManagement ReferenceId="SM-AAD" />
157+
</TechnicalProfile>
154158
</TechnicalProfiles>
155159
</ClaimsProvider>
156160
<!--
@@ -159,6 +163,8 @@ A claims transformation technical profile initiates the **isForgotPassword** cla
159163

160164
The **SelfAsserted-LocalAccountSignin-Email** technical profile **setting.forgotPasswordLinkOverride** defines the password reset claims exchange that executes in your user journey.
161165

166+
The **LocalAccountWritePasswordUsingObjectId** technical profile **UseTechnicalProfileForSessionManagement** `SM-AAD` session manager is required for the user to preform subsequent logins successfully under [SSO](./custom-policy-reference-sso.md) conditions.
167+
162168
### Add the password reset sub journey
163169

164170
The user can now sign in, sign up, and perform password reset in your user journey. To better organize the user journey, you can use a [sub journey](subjourneys.md) to handle the password reset flow.

articles/active-directory-b2c/configure-authentication-sample-spa-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ In your own environment, if your SPA app uses MSAL.js 1.3 or earlier and the imp
101101

102102
1. In the left menu, under **Manage**, select **Authentication**.
103103

104-
1. Under **Implicit grant and hybrid flows**, select both the **Access tokens (used for implicit flows)** and **D tokens (used for implicit and hybrid flows)** check boxes.
104+
1. Under **Implicit grant and hybrid flows**, select both the **Access tokens (used for implicit flows)** and **ID tokens (used for implicit and hybrid flows)** check boxes.
105105

106106
1. Select **Save**.
107107

articles/active-directory/authentication/concept-authentication-phone-options.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/09/2022
9+
ms.date: 06/23/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -59,7 +59,7 @@ With phone call verification during SSPR or Azure AD Multi-Factor Authentication
5959
If you have problems with phone authentication for Azure AD, review the following troubleshooting steps:
6060

6161
* “You've hit our limit on verification calls” or “You’ve hit our limit on text verification codes” error messages during sign-in
62-
* Microsoft may limit repeated authentication attempts that are performed by the same user or organization in a short period of time. This limitation does not apply to the Microsoft Entra Authenticator app or verification codes. If you have hit these limits, you can use the Authenticator App, verification code or try to sign in again in a few minutes.
62+
* Microsoft may limit repeated authentication attempts that are performed by the same user or organization in a short period of time. This limitation does not apply to Microsoft Authenticator or verification codes. If you have hit these limits, you can use the Authenticator App, verification code or try to sign in again in a few minutes.
6363
* "Sorry, we're having trouble verifying your account" error message during sign-in
6464
* Microsoft may limit or block voice or SMS authentication attempts that are performed by the same user, phone number, or organization due to high number of voice or SMS authentication attempts. If you are experiencing this error, you can try another method, such as Authenticator App or verification code, or reach out to your admin for support.
6565
* Blocked caller ID on a single device.

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Use additional context in Microsoft Entra Authenticator notifications (Preview) - Azure Active Directory
2+
title: Use additional context in Microsoft Authenticator notifications (Preview) - Azure Active Directory
33
description: Learn how to use additional context in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 06/08/2022
7+
ms.date: 06/23/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1313
---
14-
# How to use additional context in Microsoft Entra Authenticator app notifications (Preview) - Authentication Methods Policy
14+
# How to use additional context in Microsoft Authenticator app notifications (Preview) - Authentication Methods Policy
1515

16-
This topic covers how to improve the security of user sign-in by adding the application and location in Microsoft Entra Authenticator app push notifications.
16+
This topic covers how to improve the security of user sign-in by adding the application and location in Microsoft Authenticator app push notifications.
1717

1818
## Prerequisites
1919

@@ -182,7 +182,7 @@ To turn off additional context, you'll need to PATCH remove **displayAppInformat
182182

183183
To enable additional context in the Azure AD portal, complete the following steps:
184184

185-
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Entra Authenticator**.
185+
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
186186
1. Select the target users, click the three dots on the right, and click **Configure**.
187187

188188
![Screenshot of how to configure number match.](media/howto-authentication-passwordless-phone/configure.png)
@@ -197,5 +197,5 @@ Additional context is not supported for Network Policy Server (NPS).
197197

198198
## Next steps
199199

200-
[Authentication methods in Azure Active Directory - Microsoft Entra Authenticator app](concept-authentication-authenticator-app.md)
200+
[Authentication methods in Azure Active Directory - Microsoft Authenticator app](concept-authentication-authenticator-app.md)
201201

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 06/09/2022
7+
ms.date: 06/23/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -13,7 +13,7 @@ ms.collection: M365-identity-device-management
1313
---
1414
# How to use number matching in multifactor authentication (MFA) notifications (Preview) - Authentication Methods Policy
1515

16-
This topic covers how to enable number matching in Microsoft Entra Authenticator push notifications to improve user sign-in security.
16+
This topic covers how to enable number matching in Microsoft Authenticator push notifications to improve user sign-in security.
1717

1818
>[!NOTE]
1919
>Number matching is a key security upgrade to traditional second factor notifications in the Authenticator app that will be enabled by default for all tenants a few months after general availability (GA).<br>
@@ -233,7 +233,7 @@ To turn number matching off, you will need to PATCH remove **numberMatchingRequi
233233

234234
To enable number matching in the Azure AD portal, complete the following steps:
235235

236-
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Entra Authenticator**.
236+
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
237237
1. Select the target users, click the three dots on the right, and click **Configure**.
238238

239239
![Screenshot of configuring number match.](media/howto-authentication-passwordless-phone/configure.png)

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
---
2-
title: Nudge users to set up Microsoft Entra Authenticator app - Azure Active Directory
3-
description: Learn how to move your organization away from less secure authentication methods to the Microsoft Entra Authenticator app
2+
title: Nudge users to set up Microsoft Authenticator - Azure Active Directory
3+
description: Learn how to move your organization away from less secure authentication methods to Microsoft Authenticator
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 06/09/2022
9+
ms.date: 06/23/2022
1010

1111
ms.author: justinha
1212
author: mjsantani
1313
manager: karenhoran
1414

1515
ms.collection: M365-identity-device-management
1616

17-
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Entra Authenticator app in Azure AD to improve and secure user sign-in events.
17+
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1818
---
19-
# How to run a registration campaign to set up Microsoft Entra Authenticator - Microsoft Entra Authenticator app
19+
# How to run a registration campaign to set up Microsoft Authenticator - Microsoft Authenticator
2020

21-
You can nudge users to set up the Microsoft Entra Authenticator app during sign-in. Users will go through their regular sign-in, perform multifactor authentication as usual, and then be prompted to set up the Microsoft Entra Authenticator app. You can include or exclude users or groups to control who gets nudged to set up the app. This allows targeted campaigns to move users from less secure authentication methods to the Authenticator app.
21+
You can nudge users to set up Microsoft Authenticator during sign-in. Users will go through their regular sign-in, perform multifactor authentication as usual, and then be prompted to set up Microsoft Authenticator. You can include or exclude users or groups to control who gets nudged to set up the app. This allows targeted campaigns to move users from less secure authentication methods to the Authenticator app.
2222

2323
In addition to choosing who can be nudged, you can define how many days a user can postpone, or "snooze", the nudge. If a user taps **Not now** to snooze the app setup, they'll be nudged again on the next MFA attempt after the snooze duration has elapsed.
2424

@@ -28,7 +28,7 @@ In addition to choosing who can be nudged, you can define how many days a user c
2828
- Users can't have already set up the Authenticator app for push notifications on their account.
2929
- Admins need to enable users for the Authenticator app using one of these policies:
3030
- MFA Registration Policy: Users will need to be enabled for **Notification through mobile app**.
31-
- Authentication Methods Policy: Users will need to be enabled for the Authenticator app and the Authentication mode set to **Any** or **Push**. If the policy is set to **Passwordless**, the user won't be eligible for the nudge. For more information about how to set the Authentication mode, see [Enable passwordless sign-in with the Microsoft Entra Authenticator app](howto-authentication-passwordless-phone.md).
31+
- Authentication Methods Policy: Users will need to be enabled for the Authenticator app and the Authentication mode set to **Any** or **Push**. If the policy is set to **Passwordless**, the user won't be eligible for the nudge. For more information about how to set the Authentication mode, see [Enable passwordless sign-in with Microsoft Authenticator](howto-authentication-passwordless-phone.md).
3232

3333
## User experience
3434

@@ -41,11 +41,11 @@ In addition to choosing who can be nudged, you can define how many days a user c
4141
1. User taps **Next** and steps through the Authenticator app setup.
4242
1. First download the app.
4343

44-
![User downloads the Microsoft Entra Authenticator app](./media/how-to-nudge-authenticator-app/download.png)
44+
![User downloads Microsoft Authenticator](./media/how-to-nudge-authenticator-app/download.png)
4545

4646
1. See how to set up the Authenticator app.
4747

48-
![User sets up the Microsoft Entra Authenticator app](./media/how-to-nudge-authenticator-app/setup.png)
48+
![User sets up Microsoft Authenticator](./media/how-to-nudge-authenticator-app/setup.png)
4949

5050
1. Scan the QR Code.
5151

@@ -308,4 +308,4 @@ It's the same as snoozing.
308308

309309
## Next steps
310310

311-
[Enable passwordless sign-in with the Microsoft Entra Authenticator app](howto-authentication-passwordless-phone.md)
311+
[Enable passwordless sign-in with Microsoft Authenticator](howto-authentication-passwordless-phone.md)

articles/active-directory/authentication/howto-mfaserver-deploy-mobileapp.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Azure MFA Server Mobile App Web Service - Azure Active Directory
3-
description: Configure MFA server to send push notifications to users with the Microsoft Entra Authenticator App.
3+
description: Configure MFA server to send push notifications to users with the Microsoft Authenticator App.
44

55
services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 06/09/2022
9+
ms.date: 06/23/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Enable mobile app authentication with Azure Multi-Factor Authentication Server
1919

20-
The Microsoft Entra Authenticator app offers an additional out-of-band verification option. Instead of placing an automated phone call or SMS to the user during login, Azure Multi-Factor Authentication pushes a notification to the Authenticator app on the user's smartphone or tablet. The user simply taps **Verify** (or enters a PIN and taps "Authenticate") in the app to complete their sign-in.
20+
The Microsoft Authenticator app offers an additional out-of-band verification option. Instead of placing an automated phone call or SMS to the user during login, Azure Multi-Factor Authentication pushes a notification to the Authenticator app on the user's smartphone or tablet. The user simply taps **Verify** (or enters a PIN and taps "Authenticate") in the app to complete their sign-in.
2121

2222
Using a mobile app for two-step verification is preferred when phone reception is unreliable. If you use the app as an OATH token generator, it doesn't require any network or internet connection.
2323

articles/applied-ai-services/form-recognizer/quickstarts/try-v3-form-recognizer-studio.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Prebuilt models help you add Form Recognizer features to your apps without havin
3939
* [**ID document**](https://formrecognizer.appliedai.azure.com/studio/prebuilt?formType=idDocument): extract text and key information from driver licenses and international passports.
4040
* [**Business card**](https://formrecognizer.appliedai.azure.com/studio/prebuilt?formType=businessCard): extract text and key information from business cards.
4141

42-
After you've completed the prerequisites, navigate to [Form Recognizer Studio General Documents](https://formrecognizer.appliedai.azure.com).
42+
After you've completed the prerequisites, navigate to [Form Recognizer Studio General Documents](https://formrecognizer.appliedai.azure.com/studio/document).
4343

4444
In the following example, we use the General Documents feature. The steps to use other pre-trained features like [W2 tax form](https://formrecognizer.appliedai.azure.com/studio/prebuilt?formType=tax.us.w2), [Read](https://formrecognizer.appliedai.azure.com/studio/read), [Layout](https://formrecognizer.appliedai.azure.com/studio/layout), [Invoice](https://formrecognizer.appliedai.azure.com/studio/prebuilt?formType=invoice), [Receipt](https://formrecognizer.appliedai.azure.com/studio/prebuilt?formType=receipt), [Business card](https://formrecognizer.appliedai.azure.com/studio/prebuilt?formType=businessCard), and [ID documents](https://formrecognizer.appliedai.azure.com/studio/prebuilt?formType=idDocument) models are similar.
4545

0 commit comments

Comments
 (0)