Skip to content

Commit d43fb34

Browse files
authored
Merge branch 'master' into managed-identity-based-authentication
2 parents 03a934b + fee6088 commit d43fb34

File tree

2,752 files changed

+37407
-32917
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,752 files changed

+37407
-32917
lines changed

.openpublishing.redirection.json

Lines changed: 431 additions & 1 deletion
Large diffs are not rendered by default.

.vscode/settings.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,4 +62,4 @@
6262
"auditd"
6363
],
6464
"git.ignoreLimitWarning": true
65-
}
65+
}

articles/active-directory-b2c/azure-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -80,8 +80,8 @@ To onboard your Azure AD tenant (the **Customer**), create an [Azure Resource Ma
8080

8181
Download the Azure Resource Manager template and parameter files:
8282

83-
- [rgDelegatedResourceManagement.json](https://raw.githubusercontent.com/Azure/Azure-Lighthouse-samples/master/Azure-Delegated-Resource-Management/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.json)
84-
- [rgDelegatedResourceManagement.parameters.json](https://raw.githubusercontent.com/Azure/Azure-Lighthouse-samples/master/Azure-Delegated-Resource-Management/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.parameters.json)
83+
- [rgDelegatedResourceManagement.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.json)
84+
- [rgDelegatedResourceManagement.parameters.json](https://github.com/Azure/Azure-Lighthouse-samples/blob/master/templates/rg-delegated-resource-management/rgDelegatedResourceManagement.parameters.json)
8585

8686
Next, update the parameters file with the values you recorded earlier. The following JSON snippet shows an example of an Azure Resource Manager template parameters file. For `authorizations.value.roleDefinitionId`, use the [built-in role](../role-based-access-control/built-in-roles.md) value for the *Contributor role*, `b24988ac-6180-42a0-ab88-20f7382dd24c`.
8787

articles/active-directory-b2c/custom-policy-get-started.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ Next, expose the API by adding a scope:
112112
1. In **App registrations (Legacy)**, select **New application registration**.
113113
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
114114
1. For **Application type**, choose **Native**.
115-
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
115+
1. For **Redirect URI**, enter `myapp://auth`.
116116
1. Select **Create**. After it's created, copy the application ID and save it to use later.
117117
1. Select **Settings**, then select **Required permissions**, and then select **Add**.
118118
1. Choose **Select an API**, search for and select **IdentityExperienceFramework**, and then click **Select**.
@@ -125,7 +125,7 @@ Next, expose the API by adding a scope:
125125
1. For **Name**, enter `ProxyIdentityExperienceFramework`.
126126
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
127127
1. Under **Redirect URI**, use the drop-down to select **Public client/native (mobile & desktop)**.
128-
1. For **Redirect URI**, enter `https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com`, where `your-tenant-name` is your Azure AD B2C tenant.
128+
1. For **Redirect URI**, enter `myapp://auth`.
129129
1. Under **Permissions**, select the *Grant admin consent to openid and offline_access permissions* check box.
130130
1. Select **Register**.
131131
1. Record the **Application (client) ID** for use in a later step.

articles/active-directory-b2c/identity-provider-adfs2016-custom.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Now that you have a button in place, you need to link it to an action. The actio
165165
To use ADFS as an identity provider in Azure AD B2C, you need to create an ADFS Relying Party Trust with the Azure AD B2C SAML metadata. The following example shows a URL address to the SAML metadata of an Azure AD B2C technical profile:
166166

167167
```
168-
https://your-tenant-name.b2clogin.com/your-tenant-name/your-policy/samlp/metadata?idptp=your-technical-profile
168+
https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy/samlp/metadata?idptp=your-technical-profile
169169
```
170170
171171
Replace the following values:

articles/active-directory/authentication/TOC.yml

Lines changed: 36 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -22,22 +22,16 @@
2222
items:
2323
- name: Authentication methods
2424
href: concept-authentication-methods.md
25-
- name: Passwordless authentication
26-
href: concept-authentication-passwordless.md
27-
- name: Security information registration
28-
href: concept-registration-mfa-sspr-combined.md
29-
- name: Password reset
25+
- name: Self-service password reset
3026
items:
3127
- name: How password reset works
3228
href: concept-sspr-howitworks.md
33-
- name: Password reset options
34-
href: concept-sspr-customization.md
35-
- name: Password reset policies
36-
href: concept-sspr-policy.md
37-
- name: What license do I need?
38-
href: concept-sspr-licensing.md
3929
- name: On-premises integration
4030
href: concept-sspr-writeback.md
31+
- name: Policies
32+
href: concept-sspr-policy.md
33+
- name: Licenses
34+
href: concept-sspr-licensing.md
4135
- name: Multi-Factor Authentication
4236
items:
4337
- name: How MFA works
@@ -50,12 +44,16 @@
5044
href: https://docs.microsoft.com/office365/admin/security-and-compliance/set-up-multi-factor-authentication?view=o365-worldwide
5145
- name: FAQ
5246
href: multi-factor-authentication-faq.md
53-
- name: Azure AD password protection
47+
- name: Passwordless authentication
48+
href: concept-authentication-passwordless.md
49+
- name: Password protection
5450
items:
5551
- name: Eliminate weak passwords in the cloud
5652
href: concept-password-ban-bad.md
5753
- name: Eliminate weak passwords on-premises
5854
href: concept-password-ban-bad-on-premises.md
55+
- name: Security information registration
56+
href: concept-registration-mfa-sspr-combined.md
5957
- name: Resilient access controls
6058
href: concept-resilient-controls.md
6159
- name: How-to guides
@@ -64,6 +62,8 @@
6462
items:
6563
- name: Deployment guide
6664
href: howto-sspr-deployment.md
65+
- name: User customization options
66+
href: howto-sspr-customization.md
6767
- name: Pre-register authentication data
6868
href: howto-sspr-authenticationdata.md
6969
- name: SSPR for Windows clients
@@ -100,28 +100,6 @@
100100
href: howto-mfa-nps-extension-rdg.md
101101
- name: VPN
102102
href: howto-mfa-nps-extension-vpn.md
103-
- name: Security info registration
104-
items:
105-
- name: Enable combined registration
106-
href: howto-registration-mfa-sspr-combined.md
107-
- name: Troubleshoot combined registration
108-
href: howto-registration-mfa-sspr-combined-troubleshoot.md
109-
- name: Azure AD password protection
110-
items:
111-
- name: Plan and deploy on-premises
112-
href: howto-password-ban-bad-on-premises-deploy.md
113-
- name: Enable and configure on-premises
114-
href: howto-password-ban-bad-on-premises-operations.md
115-
- name: Monitor on-premises deployments
116-
href: howto-password-ban-bad-on-premises-monitor.md
117-
- name: Troubleshoot on-premises deployments
118-
href: howto-password-ban-bad-on-premises-troubleshoot.md
119-
- name: On-premises FAQs
120-
href: howto-password-ban-bad-on-premises-faq.md
121-
- name: On-premises agent version history
122-
href: howto-password-ban-bad-on-premises-agent-versions.md
123-
- name: Azure AD smart lockout
124-
href: howto-password-smart-lockout.md
125103
- name: Passwordless
126104
items:
127105
- name: Deploying passwordless
@@ -138,16 +116,38 @@
138116
href: howto-authentication-passwordless-phone.md
139117
- name: Windows Hello for Business
140118
href: https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-identity-verification
119+
- name: Security info registration
120+
items:
121+
- name: Enable combined registration
122+
href: howto-registration-mfa-sspr-combined.md
123+
- name: Troubleshoot combined registration
124+
href: howto-registration-mfa-sspr-combined-troubleshoot.md
125+
- name: On-premises password protection
126+
items:
127+
- name: Plan and deploy
128+
href: howto-password-ban-bad-on-premises-deploy.md
129+
- name: Enable and configure
130+
href: howto-password-ban-bad-on-premises-operations.md
131+
- name: Monitor
132+
href: howto-password-ban-bad-on-premises-monitor.md
133+
- name: Troubleshoot
134+
href: howto-password-ban-bad-on-premises-troubleshoot.md
135+
- name: FAQs
136+
href: howto-password-ban-bad-on-premises-faq.md
137+
- name: Agent version history
138+
href: howto-password-ban-bad-on-premises-agent-versions.md
141139
- name: Use SMS-based authentication (preview)
142140
href: howto-authentication-sms-signin.md
141+
- name: Azure AD smart lockout
142+
href: howto-password-smart-lockout.md
143143
- name: Certificate-based authentication
144144
items:
145145
- name: Get started with certificate auth
146146
href: active-directory-certificate-based-authentication-get-started.md
147147
items:
148-
- name: CBA on Android Devices
148+
- name: Use on Android Devices
149149
href: active-directory-certificate-based-authentication-android.md
150-
- name: CBA on iOS Devices
150+
- name: Use on iOS Devices
151151
href: active-directory-certificate-based-authentication-ios.md
152152
- name: Reporting
153153
items:

articles/active-directory/authentication/active-directory-certificate-based-authentication-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ iOS devices can use certificate-based authentication (CBA) to authenticate to Az
2424

2525
Configuring this feature eliminates the need to enter a username and password combination into certain mail and Microsoft Office applications on your mobile device.
2626

27-
This topic provides you with the requirements and the supported scenarios for configuring CBA on an iOS(Android) device for users of tenants in Office 365 Enterprise, Business, Education, US Government, China, and Germany plans.
27+
This topic provides you with the requirements and the supported scenarios for configuring CBA on an iOS device for users of tenants in Office 365 Enterprise, Business, Education, US Government, China, and Germany plans.
2828

2929
This feature is available in preview in Office 365 US Government Defense and Federal plans.
3030

articles/active-directory/authentication/active-directory-passwords-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/11/2018
9+
ms.date: 04/15/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
@@ -232,7 +232,7 @@ This FAQ is split into the following sections:
232232
>
233233
* **Q: Is there an API to access the password reset or registration reporting data?**
234234

235-
> **A:** Yes. To learn how you can access the password reset reporting data stream, see [Learn how to access password reset reporting events programmatically](https://msdn.microsoft.com/library/azure/mt126081.aspx#BKMK_SsprActivityEvent).
235+
> **A:** Yes. To learn how you can access the password reset reporting data, see the [Azure Log Analytics REST API Reference](/rest/api/loganalytics/).
236236
>
237237
>
238238

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 14 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,39 @@
11
---
22
title: Combined registration for SSPR and MFA - Azure Active Directory
3-
description: Azure AD Multi-Factor Authentication and self-service password reset registration (preview)
3+
description: Azure AD Multi-Factor Authentication and self-service password reset registration
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 03/06/2020
9+
ms.date: 04/15/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
1313
manager: daveba
14-
ms.reviewer: sahenry
14+
ms.reviewer: rhicock
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# Combined security information registration (preview)
18+
# Combined security information registration overview
1919

2020
Before combined registration, users registered authentication methods for Azure Multi-Factor Authentication and self-service password reset (SSPR) separately. People were confused that similar methods were used for Multi-Factor Authentication and SSPR but they had to register for both features. Now, with combined registration, users can register once and get the benefits of both Multi-Factor Authentication and SSPR.
2121

22+
This article outlines what combined security registration is. To get started with combined security registration, see the following article:
23+
24+
> [!div class="nextstepaction"]
25+
> [Enable combined security regiration](howto-registration-mfa-sspr-combined.md)
26+
2227
![My Profile showing registered Security info for a user](media/concept-registration-mfa-sspr-combined/combined-security-info-defualts-registered.png)
2328

2429
Before enabling the new experience, review this administrator-focused documentation and the user-focused documentation to ensure you understand the functionality and effect of this feature. Base your training on the [user documentation](../user-help/user-help-security-info-overview.md) to prepare your users for the new experience and help to ensure a successful rollout.
2530

2631
Azure AD combined security information registration is not currently available to national clouds like Azure US Government, Azure Germany, or Azure China 21Vianet.
2732

28-
| |
29-
| --- |
30-
| Combined security information registration for Multi-Factor Authentication and Azure Active Directory (Azure AD) self-service password reset is a public preview feature of Azure AD. For more information about previews, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).|
31-
| |
32-
3333
> [!IMPORTANT]
3434
> Users who are enabled for both the original preview and the enhanced combined registration experience will see the new behavior. Users who are enabled for both experiences will see only the new My Profile experience. The new My Profile aligns with the look and feel of combined registration and provides a seamless experience for users. Users can see My Profile by going to [https://myprofile.microsoft.com](https://myprofile.microsoft.com).
35-
36-
> [!NOTE]
37-
> You might encounter an error message while trying to access the Security info option. For example, "Sorry, we can't sign you in". In this case, confirm that you don't have any configuration or group policy object that blocks third-party cookies on the web browser.
35+
>
36+
> You might encounter an error message while trying to access the Security info option. For example, "Sorry, we can't sign you in". In this case, confirm that you don't have any configuration or group policy object that blocks third-party cookies on the web browser.
3837
3938
My Profile pages are localized based on the language settings of the computer accessing the page. Microsoft stores the most recent language used in the browser cache, so subsequent attempts to access the pages will continue to render in the last language used. If you clear the cache, the pages will re-render. If you want to force a specific language, you can add `?lng=<language>` to the end of the URL, where `<language>` is the code of the language you want to render.
4039

@@ -74,7 +73,6 @@ As we continue to add more authentication methods to Azure AD, those methods wil
7473
There are two modes of combined registration: interrupt and manage.
7574

7675
- **Interrupt mode** is a wizard-like experience, presented to users when they register or refresh their security info at sign-in.
77-
7876
- **Manage mode** is part of the user profile and allows users to manage their security info.
7977

8078
For both modes, users who have previously registered a method that can be used for Multi-Factor Authentication will need to perform Multi-Factor Authentication before they can access their security info.
@@ -136,14 +134,8 @@ A user who has previously set up at least one method that can be used for Multi-
136134

137135
## Next steps
138136

139-
[Force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options)
140-
141-
[Enable combined registration in your tenant](howto-registration-mfa-sspr-combined.md)
142-
143-
[SSPR and MFA usage and insights reporting](howto-authentication-methods-usage-insights.md)
144-
145-
[Available methods for Multi-Factor Authentication and SSPR](concept-authentication-methods.md)
137+
To get started, see the tutorials to [enable self-service password reset](tutorial-enable-sspr.md) and [enable Azure Multi-Factor Authentication](tutorial-enable-azure-mfa.md).
146138

147-
[Configure self-service password reset](howto-sspr-deployment.md)
139+
Learn how to [enable combined registration in your tenant](howto-registration-mfa-sspr-combined.md) or [force users to re-register authentication methods](howto-mfa-userdevicesettings.md#manage-user-authentication-options).
148140

149-
[Configure Azure Multi-Factor Authentication](howto-mfa-getstarted.md)
141+
You can also review the [available methods for Azure Multi-Factor Authentication and SSPR](concept-authentication-methods.md).

0 commit comments

Comments
 (0)