Skip to content

Commit d4dfbc3

Browse files
authored
Merge pull request #79622 from MicrosoftDocs/master
6/13 PM Publish
2 parents 41ca82b + 8fa055c commit d4dfbc3

File tree

924 files changed

+5015
-3361
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

924 files changed

+5015
-3361
lines changed

articles/active-directory-b2c/active-directory-b2c-faqs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ There are two common reasons for why the Azure AD extension is not working for y
2323
Azure AD and Azure AD B2C are separate product offerings and cannot coexist in the same tenant. An Azure AD tenant represents an organization. An Azure AD B2C tenant represents a collection of identities to be used with relying party applications. With custom policies (in public preview), Azure AD B2C can federate to Azure AD allowing authentication of employees in an organization.
2424

2525
### Can I use Azure AD B2C to provide social login (Facebook and Google+) into Office 365?
26-
Azure AD B2C can't be used to authenticate users for Microsoft Office 365. Azure AD is Microsoft's solution for managing employee access to SaaS apps and it has features designed for this purpose such as licensing and conditional access. Azure AD B2C provides an identity and access management platform for building web and mobile applications. When Azure AD B2C is configured to federate to an Azure AD tenant, the Azure AD tenant manages employee access to applications that rely on Azure AD B2C.
26+
Azure AD B2C can't be used to authenticate users for Microsoft Office 365. Azure AD is Microsoft's solution for managing employee access to SaaS apps and it has features designed for this purpose such as licensing and Conditional Access. Azure AD B2C provides an identity and access management platform for building web and mobile applications. When Azure AD B2C is configured to federate to an Azure AD tenant, the Azure AD tenant manages employee access to applications that rely on Azure AD B2C.
2727

2828
### What are local accounts in Azure AD B2C? How are they different from work or school accounts in Azure AD?
2929
In an Azure AD tenant, users that belong to the tenant sign-in with an email address of the form `<xyz>@<tenant domain>`. The `<tenant domain>` is one of the verified domains in the tenant or the initial `<...>.onmicrosoft.com` domain. This type of account is a work or school account.

articles/active-directory/authentication/concept-mfa-howitworks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Multi-Factor Authentication comes as part of the following offerings:
4747
Since most users are accustomed to using only passwords to authenticate, it is important that your organization communicates to all users regarding this process. Awareness can reduce the likelihood that users call your help desk for minor issues related to MFA. However, there are some scenarios where temporarily disabling MFA is necessary. Use the following guidelines to understand how to handle those scenarios:
4848

4949
* Train your support staff to handle scenarios where the user can't sign in because they do not have access to their authentication methods or they are not working correctly.
50-
* Using conditional access policies for Azure MFA Service, your support staff can add a user to a group that is excluded from a policy requiring MFA.
50+
* Using Conditional Access policies for Azure MFA Service, your support staff can add a user to a group that is excluded from a policy requiring MFA.
5151
* Consider using Conditional Access named locations as a way to minimize two-step verification prompts. With this functionality, administrators can bypass two-step verification for users that are signing in from a secure trusted network location such as a network segment used for new user onboarding.
5252
* Deploy [Azure AD Identity Protection](../active-directory-identityprotection.md) and trigger two-step verification based on risk events.
5353

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Combined registration supports the following authentication methods and actions:
5454
| App passwords | Yes | No | Yes |
5555

5656
> [!NOTE]
57-
> App passwords are available only to users who have been enforced for Multi-Factor Authentication. App passwords are not available to users who are enabled for Multi-Factor Authentication via a conditional access policy.
57+
> App passwords are available only to users who have been enforced for Multi-Factor Authentication. App passwords are not available to users who are enabled for Multi-Factor Authentication via a Conditional Access policy.
5858
5959
Users can set one of the following options as the default Multi-Factor Authentication method:
6060

@@ -83,7 +83,7 @@ Here are several scenarios in which users might be prompted to register or refre
8383

8484
- Multi-Factor Authentication registration enforced through Identity Protection: Users are asked to register during sign-in. They register Multi-Factor Authentication methods and SSPR methods (if the user is enabled for SSPR).
8585
- Multi-Factor Authentication registration enforced through per-user Multi-Factor Authentication: Users are asked to register during sign-in. They register Multi-Factor Authentication methods and SSPR methods (if the user is enabled for SSPR).
86-
- Multi-Factor Authentication registration enforced through conditional access or other policies: Users are asked to register when they use a resource that requires Multi-Factor Authentication. They register Multi-Factor Authentication methods and SSPR methods (if the user is enabled for SSPR).
86+
- Multi-Factor Authentication registration enforced through Conditional Access or other policies: Users are asked to register when they use a resource that requires Multi-Factor Authentication. They register Multi-Factor Authentication methods and SSPR methods (if the user is enabled for SSPR).
8787
- SSPR registration enforced: Users are asked to register during sign-in. They register only SSPR methods.
8888
- SSPR refresh enforced: Users are required to review their security info at an interval set by the admin. Users are shown their info and can confirm the current info or make changes if needed.
8989

articles/active-directory/authentication/concept-resilient-controls.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,8 @@ This document provides guidance on strategies an organization should adopt to pr
3131
There are four key takeaways in this document:
3232

3333
* Avoid administrator lockout by using emergency access accounts.
34-
* Implement MFA using conditional access (CA) rather than per-user MFA.
35-
* Mitigate user lockout by using multiple conditional access (CA) controls.
34+
* Implement MFA using Conditional Access (CA) rather than per-user MFA.
35+
* Mitigate user lockout by using multiple Conditional Access (CA) controls.
3636
* Mitigate user lockout by provisioning multiple authentication methods or equivalents for each user.
3737

3838
## Before a disruption
@@ -52,11 +52,11 @@ To unlock admin access to your tenant, you should create emergency access accoun
5252

5353
### Mitigating user lockout
5454

55-
To mitigate the risk of user lockout, use conditional access policies with multiple controls to give users a choice of how they will access apps and resources. By giving a user the choice between, for example, signing in with MFA **or** signing in from a managed device **or** signing in from the corporate network, if one of the access controls is unavailable the user has other options to continue to work.
55+
To mitigate the risk of user lockout, use Conditional Access policies with multiple controls to give users a choice of how they will access apps and resources. By giving a user the choice between, for example, signing in with MFA **or** signing in from a managed device **or** signing in from the corporate network, if one of the access controls is unavailable the user has other options to continue to work.
5656

5757
#### Microsoft recommendations
5858

59-
Incorporate the following access controls in your existing conditional access policies for organization:
59+
Incorporate the following access controls in your existing Conditional Access policies for organization:
6060

6161
1. Provision multiple authentication methods for each user that rely on different communication channels, for example the Microsoft Authenticator app (internet-based), OATH token (generated on-device), and SMS (telephonic).
6262
2. Deploy Windows Hello for Business on Windows 10 devices to satisfy MFA requirements directly from device sign-in.
@@ -103,7 +103,7 @@ Alternatively, your organization can also create contingency policies. To create
103103

104104
#### Microsoft recommendations
105105

106-
A contingency conditional access policy is a **disabled policy** that omits Azure MFA, third-party MFA, risk-based or device-based controls. Then, when your organization decides to activate your contingency plan, administrators can enable the policy and disable the regular control-based policies.
106+
A contingency Conditional Access policy is a **disabled policy** that omits Azure MFA, third-party MFA, risk-based or device-based controls. Then, when your organization decides to activate your contingency plan, administrators can enable the policy and disable the regular control-based policies.
107107

108108
>[!IMPORTANT]
109109
> Disabling policies that enforce security on your users, even temporarily, will reduce your security posture while the contingency plan is in place.
@@ -241,7 +241,7 @@ Undo the changes you made as part of the activated contingency plan once the ser
241241

242242
## Emergency options
243243

244-
In case of an emergency and your organization did not previously implement a mitigation or contingency plan, then follow the recommendations in the [Contingencies for user lockout](#contingencies-for-user-lockout) section if they already use conditional access policies to enforce MFA.
244+
In case of an emergency and your organization did not previously implement a mitigation or contingency plan, then follow the recommendations in the [Contingencies for user lockout](#contingencies-for-user-lockout) section if they already use Conditional Access policies to enforce MFA.
245245
If your organization is using per-user MFA legacy policies, then you can consider the following alternative:
246246

247247
1. If you have the corporate network outbound IP address, you can add them as trusted IPs to enable authentication only to the corporate network.
@@ -262,5 +262,5 @@ Undo the changes you made as part of the activated contingency plan once the ser
262262
* [How to configure hybrid Azure Active Directory joined devices](https://docs.microsoft.com/azure/active-directory/devices/hybrid-azuread-join-plan)
263263
* [Windows Hello for Business Deployment Guide](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-deployment-guide)
264264
* [Password Guidance - Microsoft Research](https://research.microsoft.com/pubs/265143/microsoft_password_guidance.pdf)
265-
* [What are conditions in Azure Active Directory conditional access?](https://docs.microsoft.com/azure/active-directory/conditional-access/conditions)
266-
* [What are access controls in Azure Active Directory conditional access?](https://docs.microsoft.com/azure/active-directory/conditional-access/controls)
265+
* [What are conditions in Azure Active Directory Conditional Access?](https://docs.microsoft.com/azure/active-directory/conditional-access/conditions)
266+
* [What are access controls in Azure Active Directory Conditional Access?](https://docs.microsoft.com/azure/active-directory/conditional-access/controls)

articles/active-directory/authentication/concept-sspr-writeback.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,6 @@ Passwords are written back in all the following situations:
148148
* Any administrator self-service force change password operation, for example, password expiration
149149
* Any administrator self-service password reset that originates from the [password reset portal](https://passwordreset.microsoftonline.com)
150150
* Any administrator-initiated end-user password reset from the [Azure portal](https://portal.azure.com)
151-
* Any administrator-initiated end-user password reset from the [Microsoft 365 admin center](https://admin.microsoft.com)
152151

153152
## Unsupported writeback operations
154153

@@ -158,6 +157,7 @@ Passwords are *not* written back in any of the following situations:
158157
* Any end user resetting their own password by using PowerShell version 1, version 2, or the Azure AD Graph API
159158
* **Unsupported administrator operations**
160159
* Any administrator-initiated end-user password reset from PowerShell version 1, version 2, or the Azure AD Graph API
160+
* Any administrator-initiated end-user password reset from the [Microsoft 365 admin center](https://admin.microsoft.com)
161161

162162
> [!WARNING]
163163
> Use of the checkbox "User must change password at next logon" in on-premises Active Directory administrative tools like Active Directory Users and Computers or the Active Directory Administrative Center is not supported. When changing a password on-premises do not check this option.

articles/active-directory/authentication/howto-mfa-adfs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -83,10 +83,10 @@ The first thing we need to do is to configure the AD FS claims. Create two claim
8383
Now that the claims are in place, we can configure trusted IPs.
8484

8585
1. Sign in to the [Azure portal](https://portal.azure.com).
86-
2. Select **Azure Active Directory** > **Conditional access** > **Named locations**.
87-
3. From the **Conditional access - Named locations** blade, select **Configure MFA trusted IPs**
86+
2. Select **Azure Active Directory** > **Conditional Access** > **Named locations**.
87+
3. From the **Conditional Access - Named locations** blade, select **Configure MFA trusted IPs**
8888

89-
![Azure AD conditional access named locations Configure MFA trusted IPs](./media/howto-mfa-adfs/trustedip6.png)
89+
![Azure AD Conditional Access named locations Configure MFA trusted IPs](./media/howto-mfa-adfs/trustedip6.png)
9090

9191
4. On the Service Settings page, under **trusted IPs**, select **Skip multi-factor-authentication for requests from federated users on my intranet**.
9292
5. Click **save**.

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ Some applications, like Office 2010 or earlier and Apple Mail before iOS 11, don
188188
Modern authentication is supported for the Microsoft Office 2013 clients and later. Office 2013 clients including Outlook, support modern authentication protocols and can be enabled to work with two-step verification. After the client is enabled, app passwords aren't required for the client.
189189

190190
>[!NOTE]
191-
>App passwords do not work with conditional access based multi-factor authentication policies and modern authentication.
191+
>App passwords do not work with Conditional Access based multi-factor authentication policies and modern authentication.
192192
193193
### Considerations about app passwords
194194

@@ -256,7 +256,7 @@ Users can also create app passwords after registration. For more information and
256256
The _Trusted IPs_ feature of Azure Multi-Factor Authentication is used by administrators of a managed or federated tenant. The feature bypasses two-step verification for users who sign in from the company intranet. The feature is available with the full version of Azure Multi-Factor Authentication, and not the free version for administrators. For details on how to get the full version of Azure Multi-Factor Authentication, see [Azure Multi-Factor Authentication](multi-factor-authentication.md).
257257

258258
> [!NOTE]
259-
> MFA trusted IPs and conditional access named locations only work with IPV4 addresses.
259+
> MFA trusted IPs and Conditional Access named locations only work with IPV4 addresses.
260260
261261
If your organization deploys the NPS extension to provide MFA to on-premises applications note the source IP address will always appear to be the NPS server the authentication attempt flows through.
262262

@@ -277,20 +277,20 @@ When the Trusted IPs feature is enabled, two-step verification is *not* required
277277

278278
Regardless of whether the Trusted IPs feature is enabled, two-step verification is required for browser flows. App passwords are required for older rich client applications.
279279

280-
### Enable named locations by using conditional access
280+
### Enable named locations by using Conditional Access
281281

282282
1. Sign in to the [Azure portal](https://portal.azure.com).
283-
2. On the left, select **Azure Active Directory** > **Conditional access** > **Named locations**.
283+
2. On the left, select **Azure Active Directory** > **Conditional Access** > **Named locations**.
284284
3. Select **New location**.
285285
4. Enter a name for the location.
286286
5. Select **Mark as trusted location**.
287287
6. Enter the IP Range in CIDR notation like **192.168.1.1/24**.
288288
7. Select **Create**.
289289

290-
### Enable the Trusted IPs feature by using conditional access
290+
### Enable the Trusted IPs feature by using Conditional Access
291291

292292
1. Sign in to the [Azure portal](https://portal.azure.com).
293-
2. On the left, select **Azure Active Directory** > **Conditional access** > **Named locations**.
293+
2. On the left, select **Azure Active Directory** > **Conditional Access** > **Named locations**.
294294
3. Select **Configure MFA trusted IPs**.
295295
4. On the **Service Settings** page, under **Trusted IPs**, choose from any of the following two options:
296296

@@ -364,7 +364,7 @@ The remember Multi-Factor Authentication feature sets a persistent cookie on the
364364

365365
The **Don't ask again for X days** option isn't shown on non-browser applications, regardless of whether the app supports modern authentication. These apps use _refresh tokens_ that provide new access tokens every hour. When a refresh token is validated, Azure AD checks that the last two-step verification occurred within the specified number of days.
366366

367-
The feature reduces the number of authentications on web apps, which normally prompt every time. The feature increases the number of authentications for modern authentication clients that normally prompt every 90 days. May also increase the number of authentications when combined with conditional access policies.
367+
The feature reduces the number of authentications on web apps, which normally prompt every time. The feature increases the number of authentications for modern authentication clients that normally prompt every 90 days. May also increase the number of authentications when combined with Conditional Access policies.
368368

369369
>[!IMPORTANT]
370370
>The **remember Multi-Factor Authentication** feature is not compatible with the **keep me signed in** feature of AD FS, when users perform two-step verification for AD FS through Azure Multi-Factor Authentication Server or a third-party multi-factor authentication solution.

articles/active-directory/authentication/howto-mfa-nps-extension.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ Before you deploy and use the NPS extension, users that are required to perform
131131
Use these steps to get a test account started:
132132
1. Sign in to [https://aka.ms/mfasetup](https://aka.ms/mfasetup) with a test account.
133133
2. Follow the prompts to set up a verification method.
134-
3. Either create a conditional access policy or [change the user state](howto-mfa-userstates.md) to require two-step verification for the test account.
134+
3. Either create a Conditional Access policy or [change the user state](howto-mfa-userstates.md) to require two-step verification for the test account.
135135

136136
Your users also need to follow these steps to enroll before they can authenticate with the NPS extension.
137137

articles/active-directory/authentication/howto-mfa-reporting.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ This data is available through the [Azure portal](https://portal.azure.com) and
5656

5757
The sign-in activity reports for MFA give you access to the following information:
5858

59-
**MFA required:** Whether MFA is required for the sign-in or not. MFA can be required due to per-user MFA, conditional access, or other reasons. Possible values are **Yes** or **No**.
59+
**MFA required:** Whether MFA is required for the sign-in or not. MFA can be required due to per-user MFA, Conditional Access, or other reasons. Possible values are **Yes** or **No**.
6060

6161
**MFA Result:** More information on whether MFA was satisfied or denied:
6262

@@ -112,7 +112,7 @@ The sign-in activity reports for MFA give you access to the following informatio
112112

113113
**MFA authentication detail:** Scrubbed version of the phone number, for example: +X XXXXXXXX64.
114114

115-
**Conditional Access** Find information about conditional access policies that affected the sign-in attempt including:
115+
**Conditional Access** Find information about Conditional Access policies that affected the sign-in attempt including:
116116

117117
- Policy name
118118
- Grant controls

0 commit comments

Comments
 (0)