Skip to content

Commit d791f8f

Browse files
authored
Merge pull request #111857 from MicrosoftDocs/master
4/17 PM Publish
2 parents eefb0f3 + 416f09f commit d791f8f

File tree

147 files changed

+1362
-919
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

147 files changed

+1362
-919
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51144,6 +51144,11 @@
5114451144
"source_path": "articles/healthcare-apis/configure-local-rbac.md",
5114551145
"redirect_url": "/azure/healthcare-apis/azure-api-for-fhir-additional-settings",
5114651146
"redirect_document_id": false
51147+
},
51148+
{
51149+
"source_path": "articles/media-services/previous/media-services-configure-tricaster-live-encoder.md",
51150+
"redirect_url": "/azure/media-services",
51151+
"redirect_document_id": false
5114751152
}
5114851153
]
5114951154
}

articles/active-directory-domain-services/administration-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ For more information on the differences in how password policies are applied dep
4545

4646
To authenticate users on the managed domain, Azure AD DS needs password hashes in a format that's suitable for NT LAN Manager (NTLM) and Kerberos authentication. Azure AD doesn't generate or store password hashes in the format that's required for NTLM or Kerberos authentication until you enable Azure AD DS for your tenant. For security reasons, Azure AD also doesn't store any password credentials in clear-text form. Therefore, Azure AD can't automatically generate these NTLM or Kerberos password hashes based on users' existing credentials.
4747

48-
For cloud-only user accounts, users must change their passwords before they can use Azure AD DS. This password change process causes the password hashes for Kerberos and NTLM authentication to be generated and stored in Azure AD.
48+
For cloud-only user accounts, users must change their passwords before they can use Azure AD DS. This password change process causes the password hashes for Kerberos and NTLM authentication to be generated and stored in Azure AD. The account isn't synchronized from Azure AD to Azure AD DS until the password is changed.
4949

5050
For users synchronized from an on-premises AD DS environment using Azure AD Connect, [enable synchronization of password hashes][hybrid-phs].
5151

articles/active-directory-domain-services/network-considerations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,11 +105,12 @@ The following network security group rules are required for Azure AD DS to provi
105105
| 443 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Synchronization with your Azure AD tenant. |
106106
| 3389 | TCP | CorpNetSaw | Any | Allow | Yes | Management of your domain. |
107107
| 5986 | TCP | AzureActiveDirectoryDomainServices | Any | Allow | Yes | Management of your domain. |
108-
| 636 | TCP | Any | Any | Allow | No | Only enabled when you configure secure LDAP (LDAPS). |
109108

110109
> [!WARNING]
111110
> Don't manually edit these network resources and configurations. When you associate a misconfigured network security group or a user defined route table with the subnet in which Azure AD DS is deployed, you may disrupt Microsoft's ability to service and manage the domain. Synchronization between your Azure AD tenant and your Azure AD DS managed domain is also disrupted.
112111
>
112+
> If you use secure LDAP, you can add the required TCP port 636 rule to allow external traffic if needed. Adding this rule doesn't place your network security group rules in an unsupported state. For more information, see [Lock down secure LDAP access over the internet](tutorial-configure-ldaps.md#lock-down-secure-ldap-access-over-the-internet)
113+
>
113114
> Default rules for *AllowVnetInBound*, *AllowAzureLoadBalancerInBound*, *DenyAllInBound*, *AllowVnetOutBound*, *AllowInternetOutBound*, and *DenyAllOutBound* also exist for the network security group. Don't edit or delete these default rules.
114115
>
115116
> The Azure SLA doesn't apply to deployments where an improperly configured network security group and/or user defined route tables have been applied that blocks Azure AD DS from updating and managing your domain.

articles/active-directory-domain-services/synchronization.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,8 @@ The following diagram illustrates how synchronization works between Azure AD DS,
2828

2929
User accounts, group memberships, and credential hashes are synchronized one way from Azure AD to Azure AD DS. This synchronization process is automatic. You don't need to configure, monitor, or manage this synchronization process. The initial synchronization may take a few hours to a couple of days, depending on the number of objects in the Azure AD directory. After the initial synchronization is complete, changes that are made in Azure AD, such as password or attribute changes, are then automatically synchronized to Azure AD DS.
3030

31+
When a user is created in Azure AD, they're not synchronized to Azure AD DS until they change their password in Azure AD. This password change process causes the password hashes for Kerberos and NTLM authentication to be generated and stored in Azure AD. The password hashes are needed to successfully authenticate a user in Azure AD DS.
32+
3133
The synchronization process is one way / unidirectional by design. There's no reverse synchronization of changes from Azure AD DS back to Azure AD. An Azure AD DS managed domain is largely read-only except for custom OUs that you can create. You can't make changes to user attributes, user passwords, or group memberships within an Azure AD DS managed domain.
3234

3335
## Attribute synchronization and mapping to Azure AD DS
@@ -130,7 +132,7 @@ The encryption keys are unique to each Azure AD tenant. These hashes are encrypt
130132

131133
Legacy password hashes are then synchronized from Azure AD into the domain controllers for an Azure AD DS managed domain. The disks for these managed domain controllers in Azure AD DS are encrypted at rest. These password hashes are stored and secured on these domain controllers similar to how passwords are stored and secured in an on-premises AD DS environment.
132134

133-
For cloud-only Azure AD environments, [users must reset/change their password](tutorial-create-instance.md#enable-user-accounts-for-azure-ad-ds) in order for the required password hashes to be generated and stored in Azure AD. For any cloud user account created in Azure AD after enabling Azure AD Domain Services, the password hashes are generated and stored in the NTLM and Kerberos compatible formats. Those new accounts don't need to reset or change their password generate the legacy password hashes.
135+
For cloud-only Azure AD environments, [users must reset/change their password](tutorial-create-instance.md#enable-user-accounts-for-azure-ad-ds) in order for the required password hashes to be generated and stored in Azure AD. For any cloud user account created in Azure AD after enabling Azure AD Domain Services, the password hashes are generated and stored in the NTLM and Kerberos compatible formats. All cloud user accounts must change their password before they're synchronized to Azure AD DS.
134136

135137
For hybrid user accounts synced from on-premises AD DS environment using Azure AD Connect, you must [configure Azure AD Connect to synchronize password hashes in the NTLM and Kerberos compatible formats](tutorial-configure-password-hash-sync.md).
136138

articles/active-directory-domain-services/tutorial-create-instance-advanced.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ The steps to generate and store these password hashes are different for cloud-on
205205
> [!TIP]
206206
> If your Azure AD tenant has a combination of cloud-only users and users from your on-premises AD, you need to complete both sets of steps.
207207
208-
For cloud-only user accounts, users must change their passwords before they can use Azure AD DS. This password change process causes the password hashes for Kerberos and NTLM authentication to be generated and stored in Azure AD. You can either expire the passwords for all users in the tenant who need to use Azure AD DS, which forces a password change on next sign-in, or instruct them to manually change their passwords. For this tutorial, let's manually change a user password.
208+
For cloud-only user accounts, users must change their passwords before they can use Azure AD DS. This password change process causes the password hashes for Kerberos and NTLM authentication to be generated and stored in Azure AD. The account isn't synchronized from Azure AD to Azure AD DS until the password is changed. Either expire the passwords for all cloud users in the tenant who need to use Azure AD DS, which forces a password change on next sign-in, or instruct cloud users to manually change their passwords. For this tutorial, let's manually change a user password.
209209

210210
Before a user can reset their password, the Azure AD tenant must be [configured for self-service password reset][configure-sspr].
211211

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ The steps to generate and store these password hashes are different for cloud-on
155155
> [!TIP]
156156
> If your Azure AD tenant has a combination of cloud-only users and users from your on-premises AD, you need to complete both sets of steps.
157157
158-
For cloud-only user accounts, users must change their passwords before they can use Azure AD DS. This password change process causes the password hashes for Kerberos and NTLM authentication to be generated and stored in Azure AD. You can either expire the passwords for all users in the tenant who need to use Azure AD DS, which forces a password change on next sign-in, or instruct them to manually change their passwords. For this tutorial, let's manually change a user password.
158+
For cloud-only user accounts, users must change their passwords before they can use Azure AD DS. This password change process causes the password hashes for Kerberos and NTLM authentication to be generated and stored in Azure AD. The account isn't synchronized from Azure AD to Azure AD DS until the password is changed. Either expire the passwords for all cloud users in the tenant who need to use Azure AD DS, which forces a password change on next sign-in, or instruct cloud users to manually change their passwords. For this tutorial, let's manually change a user password.
159159

160160
Before a user can reset their password, the Azure AD tenant must be [configured for self-service password reset][configure-sspr].
161161

articles/active-directory/app-provisioning/customize-application-attributes.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,10 @@ The SCIM RFC defines a core user and group schema, while also allowing for exten
139139
4. Select **Edit attribute list for AppName**.
140140
5. At the bottom of the attribute list, enter information about the custom attribute in the fields provided. Then select **Add Attribute**.
141141

142-
For SCIM applications, the attribute name must follow the pattern shown in the example below. The "CustomExtensionName" and "CustomAttribute" can be customized per your application's requirements, for example: urn:ietf:params:scim:schemas:extension:2.0:CustomExtensionName:CustomAttribute or urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User.CustomAttributeName:value
142+
For SCIM applications, the attribute name must follow the pattern shown in the example below. The "CustomExtensionName" and "CustomAttribute" can be customized per your application's requirements, for example:
143+
* urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User:CustomAttribute
144+
* urn:ietf:params:scim:schemas:extension:2.0:CustomExtensionName:CustomAttribute
145+
* urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User.CustomAttributeName:value
143146

144147
These instructions are only applicable to SCIM-enabled applications. Applications such as ServiceNow and Salesforce are not integrated with Azure AD using SCIM, and therefore they don't require this specific namespace when adding a custom attribute.
145148

Lines changed: 31 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,32 +1,29 @@
11
---
22
title: Certificate-based authentication on iOS - Azure Active Directory
3-
description: Learn about the supported scenarios and the requirements for configuring certificate-based authentication in solutions with iOS devices
3+
description: Learn about the supported scenarios and the requirements for configuring certificate-based authentication for Azure Active Directory in solutions with iOS devices
44

55
services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/15/2018
9+
ms.date: 04/17/2020
1010

1111
ms.author: iainfou
1212
author: iainfoulds
1313
manager: daveba
14-
ms.reviewer: annaba
1514

1615
ms.collection: M365-identity-device-management
1716
---
1817
# Azure Active Directory certificate-based authentication on iOS
1918

20-
iOS devices can use certificate-based authentication (CBA) to authenticate to Azure Active Directory using a client certificate on their device when connecting to:
19+
To improve security, iOS devices can use certificate-based authentication (CBA) to authenticate to Azure Active Directory (Azure AD) using a client certificate on their device when connecting to the following applications or services:
2120

2221
* Office mobile applications such as Microsoft Outlook and Microsoft Word
2322
* Exchange ActiveSync (EAS) clients
2423

25-
Configuring this feature eliminates the need to enter a username and password combination into certain mail and Microsoft Office applications on your mobile device.
24+
Using certificates eliminates the need to enter a username and password combination into certain mail and Microsoft Office applications on your mobile device.
2625

27-
This topic provides you with the requirements and the supported scenarios for configuring CBA on an iOS device for users of tenants in Office 365 Enterprise, Business, Education, US Government, China, and Germany plans.
28-
29-
This feature is available in preview in Office 365 US Government Defense and Federal plans.
26+
This article details the requirements and the supported scenarios for configuring CBA on an iOS device. CBA for iOS is available across Azure public clouds, Microsoft Government Cloud, Microsoft Cloud Germany, and Microsoft Azure China 21Vianet.
3027

3128
## Microsoft mobile applications support
3229

@@ -45,40 +42,48 @@ This feature is available in preview in Office 365 US Government Defense and Fed
4542

4643
## Requirements
4744

48-
The device OS version must be iOS 9 and above
45+
To use CBA with iOS, the following requirements and considerations apply:
46+
47+
* The device OS version must be iOS 9 or above.
48+
* Microsoft Authenticator is required for Office applications on iOS.
49+
* An identity preference must be created in the macOS Keychain that include the authentication URL of the ADFS server. For more information, see [Create an identity preference in Keychain Access on Mac](https://support.apple.com/guide/keychain-access/create-an-identity-preference-kyca6343b6c9/mac).
4950

50-
A federation server must be configured.
51+
The following Active Directory Federation Services (ADFS) requirements and considerations apply:
5152

52-
Microsoft Authenticator is required for Office applications on iOS.
53+
* The ADFS server must be enabled for certificate authentication and use federated authentication.
54+
* The certificate needs to have to use Enhanced Key Usage (EKU) and contain the UPN of the user in the *Subject Alternative Name (NT Principal Name)*.
5355

54-
For Azure Active Directory to revoke a client certificate, the ADFS token must have the following claims:
56+
## Configure ADFS
5557

56-
* `http://schemas.microsoft.com/ws/2008/06/identity/claims/<serialnumber>`
57-
(The serial number of the client certificate)
58-
* `http://schemas.microsoft.com/2012/12/certificatecontext/field/<issuer>`
59-
(The string for the issuer of the client certificate)
58+
For Azure AD to revoke a client certificate, the ADFS token must have the following claims. Azure AD adds these claims to the refresh token if they're available in the ADFS token (or any other SAML token). When the refresh token needs to be validated, this information is used to check the revocation:
6059

61-
Azure Active Directory adds these claims to the refresh token if they are available in the ADFS token (or any other SAML token). When the refresh token needs to be validated, this information is used to check the revocation.
60+
* `http://schemas.microsoft.com/ws/2008/06/identity/claims/<serialnumber>` - add the serial number of your client certificate
61+
* `http://schemas.microsoft.com/2012/12/certificatecontext/field/<issuer>` - add the string for the issuer of your client certificate
6262

63-
As a best practice, you should update your organization's ADFS error pages with the following information:
63+
As a best practice, you also should update your organization's ADFS error pages with the following information:
6464

65-
* The requirement for installing the Microsoft Authenticator on iOS
65+
* The requirement for installing the Microsoft Authenticator on iOS.
6666
* Instructions on how to get a user certificate.
6767

68-
For more information, see [Customizing the AD FS Sign-in Pages](https://technet.microsoft.com/library/dn280950.aspx).
68+
For more information, see [Customizing the AD FS sign in page](https://technet.microsoft.com/library/dn280950.aspx).
69+
70+
## Use modern authentication with Office apps
71+
72+
Some Office apps with modern authentication enabled send `prompt=login` to Azure AD in their request. By default, Azure AD translates `prompt=login` in the request to ADFS as `wauth=usernamepassworduri` (asks ADFS to do U/P Auth) and `wfresh=0` (asks ADFS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, modify the default Azure AD behavior.
6973

70-
Some Office apps (with modern authentication enabled) send '*prompt=login*' to Azure AD in their request. By default, Azure AD translates '*prompt=login*' in the request to ADFS as '*wauth=usernamepassworduri*' (asks ADFS to do U/P Auth) and '*wfresh=0*' (asks ADFS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, you need to modify the default Azure AD behavior. Just set the '*PromptLoginBehavior*' in your federated domain settings to '*Disabled*'.
71-
You can use the [MSOLDomainFederationSettings](/powershell/module/msonline/set-msoldomainfederationsettings?view=azureadps-1.0) cmdlet to perform this task:
74+
To update the default behavior, set the '*PromptLoginBehavior*' in your federated domain settings to *Disabled*. You can use the [MSOLDomainFederationSettings](/powershell/module/msonline/set-msoldomainfederationsettings?view=azureadps-1.0) cmdlet to perform this task, as shown in the following example:
7275

73-
`Set-MSOLDomainFederationSettings -domainname <domain> -PromptLoginBehavior Disabled`
76+
```powershell
77+
Set-MSOLDomainFederationSettings -domainname <domain> -PromptLoginBehavior Disabled
78+
```
7479

75-
## Exchange ActiveSync clients support
80+
## Support for Exchange ActiveSync clients
7681

77-
On iOS 9 or later, the native iOS mail client is supported. For all other Exchange ActiveSync applications, to determine if this feature is supported, contact your application developer.
82+
On iOS 9 or later, the native iOS mail client is supported. To determine if this feature is supported for all other Exchange ActiveSync applications, contact your application developer.
7883

7984
## Next steps
8085

81-
If you want to configure certificate-based authentication in your environment, see [Get started with certificate-based authentication on Android](../authentication/active-directory-certificate-based-authentication-get-started.md) for instructions.
86+
To configure certificate-based authentication in your environment, see [Get started with certificate-based authentication](active-directory-certificate-based-authentication-get-started.md) for instructions.
8287

8388
<!--Image references-->
8489
[1]: ./media/active-directory-certificate-based-authentication-ios/ic195031.png

0 commit comments

Comments
 (0)