Skip to content

Commit d2b4a9d

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents ed47e09 + f52140f commit d2b4a9d

File tree

205 files changed

+914
-1859
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

205 files changed

+914
-1859
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13479,6 +13479,84 @@
1347913479
"redirect_url": "/azure/active-directory/managed-identities-azure-resources/services-id-authentication-support",
1348013480
"redirect_document_id": false
1348113481
},
13482+
{
13483+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-accesscontrol-requirements.md",
13484+
"redirect_url": "/azure/active-directory/hybrid/index",
13485+
"redirect_document_id": false
13486+
},
13487+
{
13488+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-business-needs.md",
13489+
"redirect_url": "/azure/active-directory/hybrid/index",
13490+
"redirect_document_id": false
13491+
},
13492+
{
13493+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-contentmgt-requirements.md",
13494+
"redirect_url": "/azure/active-directory/hybrid/index",
13495+
"redirect_document_id": false
13496+
},
13497+
{
13498+
"source_path_from_root": "/articles/active-directory/hybrid/connect/aplan-hybrid-identity-design-considerations-data-protection-strategy.md",
13499+
"redirect_url": "/azure/active-directory/hybrid/index",
13500+
"redirect_document_id": false
13501+
},
13502+
{
13503+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-dataprotection-requirements.md",
13504+
"redirect_url": "/azure/active-directory/hybrid/index",
13505+
"redirect_document_id": false
13506+
},
13507+
{
13508+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-hybrid-id-management-tasks.md",
13509+
"redirect_url": "/azure/active-directory/hybrid/index",
13510+
"redirect_document_id": false
13511+
},
13512+
{
13513+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-identity-adoption-strategy.md",
13514+
"redirect_url": "/azure/active-directory/hybrid/index",
13515+
"redirect_document_id": false
13516+
},
13517+
{
13518+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-lifecycle-adoption-strategy.md",
13519+
"redirect_url": "/azure/active-directory/hybrid/index",
13520+
"redirect_document_id": false
13521+
},
13522+
{
13523+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-data-protection-strategy.md",
13524+
"redirect_url": "/azure/active-directory/hybrid/connect/index",
13525+
"redirect_document_id": false
13526+
},
13527+
{
13528+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-directory-sync-requirements.md",
13529+
"redirect_url": "/azure/active-directory/hybrid/connect/index",
13530+
"redirect_document_id": false
13531+
},
13532+
{
13533+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-multifactor-auth-requirements.md",
13534+
"redirect_url": "/azure/active-directory/hybrid/index",
13535+
"redirect_document_id": false
13536+
},
13537+
{
13538+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-incident-response-requirements.md",
13539+
"redirect_url": "/azure/active-directory/hybrid/connect/index",
13540+
"redirect_document_id": false
13541+
},
13542+
13543+
{
13544+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-nextsteps.md",
13545+
"redirect_url": "/azure/active-directory/hybrid/index",
13546+
"redirect_document_id": false
13547+
},
13548+
{
13549+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-overview.md",
13550+
"redirect_url": "/azure/active-directory/hybrid/index",
13551+
"redirect_document_id": false
13552+
},
13553+
{
13554+
"source_path_from_root": "/articles/active-directory/hybrid/connect/plan-hybrid-identity-design-considerations-tools-comparison.md",
13555+
"redirect_url": "/azure/active-directory/hybrid/index",
13556+
"redirect_document_id": false
13557+
},
13558+
13559+
1348213560
{
1348313561
"source_path_from_root": "/articles/active-directory/fundamentals/add-users-azure-active-directory.md",
1348413562
"redirect_url": "/azure/active-directory/fundamentals/add-users",

articles/active-directory/app-provisioning/sap-successfactors-integration-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.reviewer: chmutali
1515

1616
# How Azure Active Directory provisioning integrates with SAP SuccessFactors
1717

18-
[Azure Active Directory user provisioning service](../app-provisioning/user-provisioning.md) integrates with [SAP SuccessFactors Employee Central](https://www.successfactors.com/products-services/core-hr-payroll/employee-central.html) to manage the identity life cycle of users. Azure Active Directory offers three prebuilt integrations:
18+
[Azure Active Directory user provisioning service](../app-provisioning/user-provisioning.md) integrates with [SAP SuccessFactors Employee Central](https://www.sap.com/products/hcm/employee-central-payroll.html) to manage the identity life cycle of users. Azure Active Directory offers three prebuilt integrations:
1919

2020
* [SuccessFactors to on-premises Active Directory user provisioning](../saas-apps/sap-successfactors-inbound-provisioning-tutorial.md)
2121
* [SuccessFactors to Azure Active Directory user provisioning](../saas-apps/sap-successfactors-inbound-provisioning-cloud-only-tutorial.md)
@@ -414,7 +414,7 @@ If you want to exclude processing of prehires in the Onboarding module, update y
414414
1. Save the mapping and validate that the scoping filter works using provisioning on demand.
415415

416416
### Enabling OData API Audit logs in SuccessFactors
417-
The Azure AD SuccessFactors connector uses SuccessFactors OData API to retrieve changes and provision users. If you observe issues with the provisioning service and want to confirm what data was retrieved from SuccessFactors, you can enable OData API Audit logs in SuccessFactors. To enable audit logs, follow the steps documented in [SAP support note 2680837](https://userapps.support.sap.com/sap/support/knowledge/en/2680837). Retrieve the request payload sent by Azure AD from the audit logs. To troubleshoot, you can copy this request payload in a tool like [Postman](https://www.postman.com/downloads/), set it up to use the same API user that is used by the connector and see if it returns the desired changes from SuccessFactors.
417+
The Azure AD SuccessFactors connector uses SuccessFactors OData API to retrieve changes and provision users. If you observe issues with the provisioning service and want to confirm what data was retrieved from SuccessFactors, you can enable OData API Audit logs in SuccessFactors. Retrieve the request payload sent by Azure AD from the audit logs. To troubleshoot, you can copy this request payload in a tool like [Postman](https://www.postman.com/downloads/), set it up to use the same API user that is used by the connector and see if it returns the desired changes from SuccessFactors.
418418

419419
## Writeback scenarios
420420
This section covers different write-back scenarios. It recommends configuration approaches based on how email and phone number is set up in SuccessFactors.

articles/active-directory/authentication/TOC.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -156,18 +156,18 @@
156156
href: certificate-based-authentication-federation-android.md
157157
- name: Use on iOS Devices
158158
href: certificate-based-authentication-federation-ios.md
159-
- name: Use a Temporary Access Pass
160-
href: howto-authentication-temporary-access-pass.md
161-
- name: Use SMS-based authentication
162-
items:
163-
- name: Manage
164-
href: howto-authentication-sms-signin.md
165-
- name: Supported apps for SMS-based authentication
166-
href: how-to-authentication-sms-supported-apps.md
167-
- name: Two-way SMS unsupported
168-
href: how-to-authentication-two-way-sms-unsupported.md
169-
- name: Use email address sign-in
170-
href: howto-authentication-use-email-signin.md
159+
- name: Use a Temporary Access Pass
160+
href: howto-authentication-temporary-access-pass.md
161+
- name: Use SMS-based authentication
162+
items:
163+
- name: Manage
164+
href: howto-authentication-sms-signin.md
165+
- name: Supported apps for SMS-based authentication
166+
href: how-to-authentication-sms-supported-apps.md
167+
- name: Two-way SMS unsupported
168+
href: how-to-authentication-two-way-sms-unsupported.md
169+
- name: Use email address sign-in
170+
href: howto-authentication-use-email-signin.md
171171
- name: Self-service password reset
172172
items:
173173
- name: Deployment guide

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,6 @@ The following providers offer FIDO2 security keys of different form factors that
131131
| [IDmelon Technologies Inc.](https://www.idmelon.com/#idmelon) | ![y] | ![y]| ![y]| ![y]| ![n] |
132132
| [Kensington](https://www.kensington.com/solutions/product-category/why-biometrics/) | ![y] | ![y]| ![n]| ![n]| ![n] |
133133
| [KONA I](https://konai.com/business/security/fido) | ![y] | ![n]| ![y]| ![y]| ![n] |
134-
| [Movenda](https://www.movenda.com/en/authentication/fido2/overview) | ![y] | ![n]| ![y]| ![y]| ![n] |
135134
| [NeoWave](https://neowave.fr/en/products/fido-range/) | ![n] | ![y]| ![y]| ![n]| ![n] |
136135
| [Nymi](https://www.nymi.com/nymi-band) | ![y] | ![n]| ![y]| ![n]| ![n] |
137136
| [Octatco](https://octatco.com/) | ![y] | ![y]| ![n]| ![n]| ![n] |

articles/active-directory/authentication/tutorial-enable-sspr.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,10 @@ In this tutorial you learn how to:
2929
> * Set up authentication methods and registration options
3030
> * Test the SSPR process as a user
3131
32+
> [!IMPORTANT]
33+
> In March 2023, we announced the deprecation of managing authentication methods in the legacy multifactor authentication (MFA) and self-service password reset (SSPR) policies. Beginning September 30, 2024, authentication methods can't be managed in these legacy MFA and SSPR policies. We recommend customers use the manual migration control to migrate to the Authentication methods policy by the deprecation date.
34+
35+
3236
## Video tutorial
3337

3438
You can also follow along in a related video: [How to enable and configure SSPR in Azure AD](https://www.youtube.com/embed/rA8TvhNcCvQ?azure-portal=true).

articles/active-directory/conditional-access/concept-token-protection.md

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use token protection in Conditional Access policies.
44
ms.service: active-directory
55
ms.subservice: conditional-access
66
ms.topic: conceptual
7-
ms.date: 07/18/2023
7+
ms.date: 08/14/2023
88

99
ms.author: joflore
1010
author: MicrosoftGuyJFlo
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717

1818
Token protection (sometimes referred to as token binding in the industry) attempts to reduce attacks using token theft by ensuring a token is usable only from the intended device. When an attacker is able to steal a token, by hijacking or replay, they can impersonate their victim until the token expires or is revoked. Token theft is thought to be a relatively rare event, but the damage from it can be significant.
1919

20-
Token protection creates a cryptographically secure tie between the token and the device (client secret) it's issued to. Without the client secret, the bound token is useless. When a user registers a Windows 10 or newer device in Azure AD, their primary identity is [bound to the device](../devices/concept-primary-refresh-token.md#how-is-the-prt-protected). What this means is that a policy can ensure that only bound sign-in session (or refresh) tokens, otherwise known as Primary Refresh Tokens (PRTs) are used by applications when requesting access to a resource.
20+
Token protection creates a cryptographically secure tie between the token and the device (client secret) it's issued to. Without the client secret, the bound token is useless. When a user registers a Windows 10 or newer device in Azure AD, their primary identity is [bound to the device](../devices/concept-primary-refresh-token.md#how-is-the-prt-protected). What this means: A policy can ensure that only bound sign-in session (or refresh) tokens, otherwise known as Primary Refresh Tokens (PRTs) are used by applications when requesting access to a resource.
2121

2222
> [!IMPORTANT]
2323
> Token protection is currently in public preview. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
@@ -35,28 +35,35 @@ With this preview, we're giving you the ability to create a Conditional Access p
3535

3636
## Requirements
3737

38-
This preview supports the following configurations:
38+
This preview supports the following configurations for access to resources with Token Protection conditional access policies applied:
3939

4040
* Windows 10 or newer devices that are Azure AD joined, hybrid Azure AD joined, or Azure AD registered.
4141
* OneDrive sync client version 22.217 or later
4242
* Teams native client version 1.6.00.1331 or later
43+
* Power BI desktop version 2.117.841.0 (May 2023) or later
44+
* Visual Studio 2022 or later when using the 'Windows authentication broker' Sign-in option
4345
* Office Perpetual clients aren't supported
4446

4547
### Known limitations
4648

4749
- External users (Azure AD B2B) aren't supported and shouldn't be included in your Conditional Access policy.
4850
- The following applications don't support signing in using protected token flows and users are blocked when accessing Exchange and SharePoint:
49-
- Power BI Desktop client
5051
- PowerShell modules accessing Exchange, SharePoint, or Microsoft Graph scopes that are served by Exchange or SharePoint
5152
- PowerQuery extension for Excel
5253
- Extensions to Visual Studio Code which access Exchange or SharePoint
53-
- Visual Studio
54-
- The new Teams 2.1 preview client gets blocked after sign out due to a bug. This bug should be fixed in an August release.
54+
- The new Teams 2.1 preview client gets blocked after sign out due to a bug. This bug should be fixed in a future service update.
5555
- The following Windows client devices aren't supported:
5656
- Windows Server
5757
- Surface Hub
5858
- Windows-based Microsoft Teams Rooms (MTR) systems
5959

60+
## Licensing requirements
61+
62+
[!INCLUDE [Active Directory P2 license](../../../includes/active-directory-p2-license.md)]
63+
64+
> [!NOTE]
65+
> Token Protection enforcement is part of Microsoft Entra ID Protection and will be part of the P2 license at general availability.
66+
6067
## Deployment
6168

6269
For users, the deployment of a Conditional Access policy to enforce token protection should be invisible when using compatible client platforms on registered devices and compatible applications.
@@ -135,7 +142,7 @@ You can also use [Log Analytics](../reports-monitoring/tutorial-log-analytics-wi
135142
Here's a sample Log Analytics query searching the non-interactive sign-in logs for the last seven days, highlighting **Blocked** versus **Allowed** requests by **Application**. These queries are only samples and are subject to change.
136143

137144
> [!NOTE]
138-
> **Sign In logs output:** The value of the string used in "enforcedSessionControls" and "sessionControlsNotSatisfied" changed from "Binding" to "SignInTokenProtection" in late June 2023. Queries on Sign In Log data should be updated to reflect this change.
145+
> **Sign In logs output:** The value of the string used in "enforcedSessionControls" and "sessionControlsNotSatisfied" changed from "Binding" to "SignInTokenProtection" in late June 2023. Queries on Sign In Log data should be updated to reflect this change. The examples cover both values to include historical data.
139146
140147
```kusto
141148
//Per Apps query
@@ -150,10 +157,10 @@ AADNonInteractiveUserSignInLogs
150157
//Add userPrinicpalName if you want to filter
151158
// | where UserPrincipalName =="<user_principal_Name>"
152159
| mv-expand todynamic(ConditionalAccessPolicies)
153-
| where ConditionalAccessPolicies ["enforcedSessionControls"] contains '["SignInTokenProtection"]'
160+
| where ConditionalAccessPolicies ["enforcedSessionControls"] contains '["Binding"]' or ConditionalAccessPolicies ["enforcedSessionControls"] contains '["SignInTokenProtection"]'
154161
| where ConditionalAccessPolicies.result !="reportOnlyNotApplied" and ConditionalAccessPolicies.result !="notApplied"
155162
| extend SessionNotSatisfyResult = ConditionalAccessPolicies["sessionControlsNotSatisfied"]
156-
| extend Result = case (SessionNotSatisfyResult contains 'SignInTokenProtection', 'Block','Allow')
163+
| extend Result = case (SessionNotSatisfyResult contains 'SignInTokenProtection' or SessionNotSatisfyResult contains 'SignInTokenProtection', 'Block','Allow')
157164
| summarize by Id,UserPrincipalName, AppDisplayName, Result
158165
| summarize Requests = count(), Users = dcount(UserPrincipalName), Block = countif(Result == "Block"), Allow = countif(Result == "Allow"), BlockedUsers = dcountif(UserPrincipalName, Result == "Block") by AppDisplayName
159166
| extend PctAllowed = round(100.0 * Allow/(Allow+Block), 2)
@@ -179,10 +186,10 @@ AADNonInteractiveUserSignInLogs
179186
//Add userPrincipalName if you want to filter
180187
// | where UserPrincipalName =="<user_principal_Name>"
181188
| mv-expand todynamic(ConditionalAccessPolicies)
182-
| where ConditionalAccessPolicies.enforcedSessionControls contains '["SignInTokenProtection"]'
189+
| where ConditionalAccessPolicies ["enforcedSessionControls"] contains '["Binding"]' or ConditionalAccessPolicies ["enforcedSessionControls"] contains '["SignInTokenProtection"]'
183190
| where ConditionalAccessPolicies.result !="reportOnlyNotApplied" and ConditionalAccessPolicies.result !="notApplied"
184191
| extend SessionNotSatisfyResult = ConditionalAccessPolicies.sessionControlsNotSatisfied
185-
| extend Result = case (SessionNotSatisfyResult contains 'SignInTokenProtection', 'Block','Allow')
192+
| extend Result = case (SessionNotSatisfyResult contains 'SignInTokenProtection' or SessionNotSatisfyResult contains 'SignInTokenProtection', 'Block','Allow')
186193
| summarize by Id, UserPrincipalName, AppDisplayName, ResourceDisplayName,Result
187194
| summarize Requests = count(),Block = countif(Result == "Block"), Allow = countif(Result == "Allow") by UserPrincipalName, AppDisplayName,ResourceDisplayName
188195
| extend PctAllowed = round(100.0 * Allow/(Allow+Block), 2)

articles/active-directory/develop/app-sign-in-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 02/17/2023
12+
ms.date: 08/11/2023
1313
ms.author: ryanwi
1414
ms.reviewer: jmprieur, saeeda, sureshja, ludwignick
1515
ms.custom: aaddev, identityplatformtop40, scenarios:getting-started

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -322,9 +322,9 @@ The AADLoginForWindows extension must be installed successfully for the VM to co
322322

323323
| Command to run | Expected output |
324324
| --- | --- |
325-
| `curl -H Metadata:true "http://169.254.169.254/metadata/instance?api-version=2017-08-01"` | Correct information about the Azure VM |
326-
| `curl -H Metadata:true "http://169.254.169.254/metadata/identity/info?api-version=2018-02-01"` | Valid tenant ID associated with the Azure subscription |
327-
| `curl -H Metadata:true "http://169.254.169.254/metadata/identity/oauth2/token?resource=urn:ms-drs:enterpriseregistration.windows.net&api-version=2018-02-01"` | Valid access token issued by Azure Active Directory for the managed identity that is assigned to this VM |
325+
| `curl.exe -H Metadata:true "http://169.254.169.254/metadata/instance?api-version=2017-08-01"` | Correct information about the Azure VM |
326+
| `curl.exe -H Metadata:true "http://169.254.169.254/metadata/identity/info?api-version=2018-02-01"` | Valid tenant ID associated with the Azure subscription |
327+
| `curl.exe -H Metadata:true "http://169.254.169.254/metadata/identity/oauth2/token?resource=urn:ms-drs:enterpriseregistration.windows.net&api-version=2018-02-01"` | Valid access token issued by Azure Active Directory for the managed identity that is assigned to this VM |
328328

329329
> [!NOTE]
330330
> You can decode the access token by using a tool like [calebb.net](http://calebb.net/). Verify that the `oid` value in the access token matches the managed identity that's assigned to the VM.

0 commit comments

Comments
 (0)