You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/join-windows-vm.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,7 +71,7 @@ If you already have a VM that you want to domain-join, skip to the section to [j
71
71
72
72
1. By default, VMs created in Azure are accessible from the Internet using RDP. When RDP is enabled, automated sign in attacks are likely to occur, which may disable accounts with common names such as *admin* or *administrator* due to multiple failed successive sign in attempts.
73
73
74
-
RDP should only be enabled when required, and limited to a set of authorized IP ranges. This configuration helps improve the security of the VM and reduces the area for potential attack. Or, create and use an Azure Bastion host that allows access only through the Azure portal over SSL. In the next step of this tutorial, you use an Azure Bastion host to securely connect to the VM.
74
+
RDP should only be enabled when required, and limited to a set of authorized IP ranges. This configuration helps improve the security of the VM and reduces the area for potential attack. Or, create and use an Azure Bastion host that allows access only through the Azure portal over TLS. In the next step of this tutorial, you use an Azure Bastion host to securely connect to the VM.
75
75
76
76
For now, disable direct RDP connections to the VM.
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/tutorial-configure-ldaps.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ The certificate you request or create must meet the following requirements. Your
64
64
***Subject name** - The subject name on the certificate must be your managed domain. For instance, if your domain is named *aaddscontoso.com*, the certificate's subject name must be **.aaddscontoso.com*.
65
65
* The DNS name or subject alternate name of the certificate must be a wildcard certificate to ensure the secure LDAP works properly with the Azure AD Domain Services. Domain Controllers use random names and can be removed or added to ensure the service remains available.
66
66
***Key usage** - The certificate must be configured for *digital signatures* and *key encipherment*.
67
-
***Certificate purpose** - The certificate must be valid for SSL server authentication.
67
+
***Certificate purpose** - The certificate must be valid for TLS server authentication.
68
68
69
69
There are several tools available to create self-signed certificate such as OpenSSL, Keytool, MakeCert, [New-SelfSignedCertificate][New-SelfSignedCertificate] cmdlet etc. In this tutorial, let's create a self-signed certificate for secure LDAP using the [New-SelfSignedCertificate][New-SelfSignedCertificate] cmdlet. Open a PowerShell window as **Administrator** and run the following commands. Replace the *$dnsName* variable with the DNS name used by your own managed domain, such as *aaddscontoso.com*:
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-sspr-writeback.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,7 +102,7 @@ Password writeback is a highly secure service. To ensure your information is pro
102
102
* After the service bus relay is created, a strong symmetric key is created that is used to encrypt the password as it comes over the wire. This key only lives in your company's secret store in the cloud, which is heavily locked down and audited, just like any other password in the directory.
103
103
***Industry standard Transport Layer Security (TLS)**
104
104
1. When a password reset or change operation occurs in the cloud, the plaintext password is encrypted with your public key.
105
-
1. The encrypted password is placed into an HTTPS message that is sent over an encrypted channel by using Microsoft SSL certs to your service bus relay.
105
+
1. The encrypted password is placed into an HTTPS message that is sent over an encrypted channel by using Microsoft TLS/SSL certs to your service bus relay.
106
106
1. After the message arrives in the service bus, your on-premises agent wakes up and authenticates to the service bus by using the strong password that was previously generated.
107
107
1. The on-premises agent picks up the encrypted message and decrypts it by using the private key.
108
108
1. The on-premises agent attempts to set the password through the AD DS SetPassword API. This step is what allows enforcement of your Active Directory on-premises password policy (such as the complexity, age, history, and filters) in the cloud.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfaserver-deploy-userportal.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,11 +40,11 @@ In either scenario, if the Azure Multi-Factor Authentication Web Service SDK is
40
40
1. Open the Multi-Factor Authentication Server console.
41
41
2. Go to the **Web Service SDK** and select **Install Web Service SDK**.
42
42
3. Complete the install using the defaults unless you need to change them for some reason.
43
-
4. Bind an SSL Certificate to the site in IIS.
43
+
4. Bind a TLS/SSL Certificate to the site in IIS.
44
44
45
-
If you have questions about configuring an SSL Certificate on an IIS server, see the article [How to Set Up SSL on IIS](https://docs.microsoft.com/iis/manage/configuring-security/how-to-set-up-ssl-on-iis).
45
+
If you have questions about configuring a TLS/SSL Certificate on an IIS server, see the article [How to Set Up SSL on IIS](https://docs.microsoft.com/iis/manage/configuring-security/how-to-set-up-ssl-on-iis).
46
46
47
-
The Web Service SDK must be secured with an SSL certificate. A self-signed certificate is okay for this purpose. Import the certificate into the “Trusted Root Certification Authorities” store of the Local Computer account on the User Portal web server so that it trusts that certificate when initiating the SSL connection.
47
+
The Web Service SDK must be secured with a TLS/SSL certificate. A self-signed certificate is okay for this purpose. Import the certificate into the “Trusted Root Certification Authorities” store of the Local Computer account on the User Portal web server so that it trusts that certificate when initiating the TLS connection.
48
48
49
49

50
50
@@ -54,23 +54,23 @@ The following pre-requisites are required to install the user portal on the **sa
54
54
55
55
* IIS, including ASP.NET, and IIS 6 meta base compatibility (for IIS 7 or higher)
56
56
* An account with admin rights for the computer and Domain if applicable. The account needs permissions to create Active Directory security groups.
57
-
* Secure the user portal with an SSL certificate.
58
-
* Secure the Azure Multi-Factor Authentication Web Service SDK with an SSL certificate.
57
+
* Secure the user portal with a TLS/SSL certificate.
58
+
* Secure the Azure Multi-Factor Authentication Web Service SDK with a TLS/SSL certificate.
59
59
60
60
To deploy the user portal, follow these steps:
61
61
62
62
1. Open the Azure Multi-Factor Authentication Server console, click the **User Portal** icon in the left menu, then click **Install User Portal**.
63
63
2. Complete the install using the defaults unless you need to change them for some reason.
64
-
3. Bind an SSL Certificate to the site in IIS
64
+
3. Bind a TLS/SSL Certificate to the site in IIS
65
65
66
66
> [!NOTE]
67
-
> This SSL Certificate is usually a publicly signed SSL Certificate.
67
+
> This TLS/SSL Certificate is usually a publicly signed TLS/SSL Certificate.
68
68
69
69
4. Open a web browser from any computer and navigate to the URL where the user portal was installed (Example: https://mfa.contoso.com/MultiFactorAuth). Ensure that no certificate warnings or errors are displayed.
70
70
71
71

72
72
73
-
If you have questions about configuring an SSL Certificate on an IIS server, see the article [How to Set Up SSL on IIS](https://docs.microsoft.com/iis/manage/configuring-security/how-to-set-up-ssl-on-iis).
73
+
If you have questions about configuring a TLS/SSL Certificate on an IIS server, see the article [How to Set Up SSL on IIS](https://docs.microsoft.com/iis/manage/configuring-security/how-to-set-up-ssl-on-iis).
74
74
75
75
## Deploy the user portal on a separate server
76
76
@@ -82,19 +82,19 @@ If your organization uses the Microsoft Authenticator app as one of the verifica
82
82
* Install the user portal on an internet-facing web server running Microsoft internet Information Services (IIS) 6.x or higher.
83
83
* When using IIS 6.x, ensure ASP.NET v2.0.50727 is installed, registered, and set to **Allowed**.
84
84
* When using IIS 7.x or higher, IIS, including Basic Authentication, ASP.NET, and IIS 6 meta base compatibility.
85
-
* Secure the user portal with an SSL certificate.
86
-
* Secure the Azure Multi-Factor Authentication Web Service SDK with an SSL certificate.
87
-
* Ensure that the user portal can connect to the Azure Multi-Factor Authentication Web Service SDK over SSL.
85
+
* Secure the user portal with a TLS/SSL certificate.
86
+
* Secure the Azure Multi-Factor Authentication Web Service SDK with a TLS/SSL certificate.
87
+
* Ensure that the user portal can connect to the Azure Multi-Factor Authentication Web Service SDK over TLS/SSL.
88
88
* Ensure that the user portal can authenticate to the Azure Multi-Factor Authentication Web Service SDK using the credentials of a service account in the "PhoneFactor Admins" security group. This service account and group should exist in Active Directory if the Azure Multi-Factor Authentication Server is running on a domain-joined server. This service account and group exist locally on the Azure Multi-Factor Authentication Server if it is not joined to a domain.
89
89
90
90
Installing the user portal on a server other than the Azure Multi-Factor Authentication Server requires the following steps:
91
91
92
92
1.**On the MFA Server**, browse to the installation path (Example: C:\Program Files\Multi-Factor Authentication Server), and copy the file **MultiFactorAuthenticationUserPortalSetup64** to a location accessible to the internet-facing server where you will install it.
93
93
2.**On the internet-facing web server**, run the MultiFactorAuthenticationUserPortalSetup64 install file as an administrator, change the Site if desired and change the Virtual directory to a short name if you would like.
94
-
3. Bind an SSL Certificate to the site in IIS.
94
+
3. Bind a TLS/SSL Certificate to the site in IIS.
95
95
96
96
> [!NOTE]
97
-
> This SSL Certificate is usually a publicly signed SSL Certificate.
97
+
> This TLS/SSL Certificate is usually a publicly signed TLS/SSL Certificate.
98
98
99
99
4. Browse to **C:\inetpub\wwwroot\MultiFactorAuth**
100
100
5. Edit the Web.Config file in Notepad
@@ -107,7 +107,7 @@ Installing the user portal on a server other than the Azure Multi-Factor Authent
107
107
108
108
6. Open a web browser from any computer and navigate to the URL where the user portal was installed (Example: https://mfa.contoso.com/MultiFactorAuth). Ensure that no certificate warnings or errors are displayed.
109
109
110
-
If you have questions about configuring an SSL Certificate on an IIS server, see the article [How to Set Up SSL on IIS](https://docs.microsoft.com/iis/manage/configuring-security/how-to-set-up-ssl-on-iis).
110
+
If you have questions about configuring a TLS/SSL Certificate on an IIS server, see the article [How to Set Up SSL on IIS](https://docs.microsoft.com/iis/manage/configuring-security/how-to-set-up-ssl-on-iis).
111
111
112
112
## Configure user portal settings in the Azure Multi-Factor Authentication Server
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfaserver-dir-ad.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ The following table describes the LDAP configuration settings.
45
45
46
46
| Feature | Description |
47
47
| --- | --- |
48
-
| Server |Enter the hostname or IP address of the server running the LDAP directory. A backup server may also be specified separated by a semi-colon. <br>Note: When Bind Type is SSL, a fully qualified hostname is required. |
48
+
| Server |Enter the hostname or IP address of the server running the LDAP directory. A backup server may also be specified separated by a semi-colon. <br>Note: When Bind Type is SSL (TLS), a fully qualified hostname is required. |
49
49
| Base DN |Enter the distinguished name of the base directory object from which all directory queries start. For example, dc=abc,dc=com. |
50
50
| Bind type - Queries |Select the appropriate bind type for use when binding to search the LDAP directory. This is used for imports, synchronization, and username resolution. <br><br> Anonymous - An anonymous bind is performed. Bind DN and Bind Password are not used. This only works if the LDAP directory allows anonymous binding and permissions allow the querying of the appropriate records and attributes. <br><br> Simple - Bind DN and Bind Password are passed as plain text to bind to the LDAP directory. This is for testing purposes, to verify that the server can be reached and that the bind account has the appropriate access. After the appropriate cert has been installed, use SSL instead. <br><br> SSL - Bind DN and Bind Password are encrypted using SSL to bind to the LDAP directory. Install a cert locally that the LDAP directory trusts. <br><br> Windows - Bind Username and Bind Password are used to securely connect to an Active Directory domain controller or ADAM directory. If Bind Username is left blank, the logged-on user's account is used to bind. |
51
51
| Bind type - Authentications |Select the appropriate bind type for use when performing LDAP bind authentication. See the bind type descriptions under Bind type - Queries. For example, this allows for Anonymous bind to be used for queries while SSL bind is used to secure LDAP bind authentications. |
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfaserver-dir-ldap.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,8 +34,8 @@ To configure LDAP authentication, install the Azure Multi-Factor Authentication
34
34
35
35

36
36
37
-
3. On the Clients tab, change the TCP port and SSL port if the Azure Multi-Factor Authentication LDAP service should bind to non-standard ports to listen for LDAP requests.
38
-
4. If you plan to use LDAPS from the client to the Azure Multi-Factor Authentication Server, an SSL certificate must be installed on the same server as MFA Server. Click **Browse** next to the SSL certificate box, and select a certificate to use for the secure connection.
37
+
3. On the Clients tab, change the TCP port and SSL (TLS) port if the Azure Multi-Factor Authentication LDAP service should bind to non-standard ports to listen for LDAP requests.
38
+
4. If you plan to use LDAPS from the client to the Azure Multi-Factor Authentication Server, an TLS/SSL certificate must be installed on the same server as MFA Server. Click **Browse** next to the SSL (TLS) certificate box, and select a certificate to use for the secure connection.
39
39
5. Click **Add**.
40
40
6. In the Add LDAP Client dialog box, enter the IP address of the appliance, server, or application that authenticates to the Server and an Application name (optional). The Application name appears in Azure Multi-Factor Authentication reports and may be displayed within SMS or Mobile App authentication messages.
41
41
7. Check the **Require Azure Multi-Factor Authentication user match** box if all users have been or will be imported into the Server and subject to two-step verification. If a significant number of users have not yet been imported into the Server and/or are exempt from two-step verification, leave the box unchecked. See the MFA Server help file for additional information on this feature.
@@ -76,4 +76,4 @@ To configure the LDAP client, use the guidelines:
76
76
77
77
* Configure your appliance, server, or application to authenticate via LDAP to the Azure Multi-Factor Authentication Server as though it were your LDAP directory. Use the same settings that you would normally use to connect directly to your LDAP directory, except for the server name or IP address, which will be that of the Azure Multi-Factor Authentication Server.
78
78
* Configure the LDAP timeout to 30-60 seconds so that there is time to validate the user’s credentials with the LDAP directory, perform the second-step verification, receive their response, and respond to the LDAP access request.
79
-
* If using LDAPS, the appliance or server making the LDAP queries must trust the SSL certificate installed on the Azure Multi-Factor Authentication Server.
79
+
* If using LDAPS, the appliance or server making the LDAP queries must trust the TLS/SSL certificate installed on the Azure Multi-Factor Authentication Server.
0 commit comments