Skip to content

Commit d7ae72c

Browse files
authored
Merge pull request #187765 from MicrosoftDocs/main
2/07 PM Publish
2 parents f55ae67 + 0bce97b commit d7ae72c

File tree

89 files changed

+628
-591
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

89 files changed

+628
-591
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
1-
{:allowed-branchname-matches ["main" "master" "release-.*"]
1+
{:allowed-branchname-matches ["main" "release-.*"]
22
:allowed-filename-matches ["(?i)articles/(?:(?!active-directory/saas-apps/toc.yml|role-based-access-control/resource-provider-operations.md))" "includes/"]}

.openpublishing.publish.config.json

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -60,13 +60,13 @@
6060
{
6161
"path_to_root": "_themes",
6262
"url": "https://github.com/Microsoft/templates.docs.msft",
63-
"branch": "master",
63+
"branch": "main",
6464
"branch_mapping": {}
6565
},
6666
{
6767
"path_to_root": "_themes.pdf",
6868
"url": "https://github.com/Microsoft/templates.docs.msft.pdf",
69-
"branch": "master",
69+
"branch": "main",
7070
"branch_mapping": {}
7171
},
7272
{
@@ -772,10 +772,10 @@
772772
"branch_mapping": {}
773773
},
774774
{
775-
"path_to_root": "digital-twins-docs-samples-getting-started",
776-
"url": "https://github.com/Azure-Samples/azure-digital-twins-getting-started",
777-
"branch": "main",
778-
"branch_mapping": {}
775+
"path_to_root": "digital-twins-docs-samples-getting-started",
776+
"url": "https://github.com/Azure-Samples/azure-digital-twins-getting-started",
777+
"branch": "main",
778+
"branch_mapping": {}
779779
},
780780
{
781781
"path_to_root": "dotnet-samples",
@@ -806,14 +806,14 @@
806806
"url": "https://github.com/Azure-Samples/msdocs-nodejs-mongodb-azure-sample-app",
807807
"branch": "main",
808808
"branch_mapping": {}
809-
}
809+
}
810810
],
811811
"branch_target_mapping": {
812812
"live": [
813813
"Publish",
814814
"PDF"
815815
],
816-
"master": [
816+
"main": [
817817
"Publish",
818818
"PDF"
819819
]
@@ -846,7 +846,7 @@
846846
".openpublishing.redirection.azure-percept.json",
847847
".openpublishing.redirection.azure-productivity.json",
848848
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
849-
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
849+
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
850850
"articles/azure-relay/.openpublishing.redirection.relay.json",
851851
"articles/communication-services/.openpublishing.redirection.communication-services.json",
852852
"articles/cosmos-db/.openpublishing.redirection.cosmos-db.json",
@@ -873,4 +873,4 @@
873873
"articles/virtual-machines/.openpublishing.redirection.virtual-machines.json",
874874
"articles/mysql/.openpublishing.redirection.mysql.json"
875875
]
876-
}
876+
}

articles/active-directory/authentication/concept-mfa-howitworks.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/07/2022
9+
ms.date: 02/07/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -31,7 +31,10 @@ Azure AD Multi-Factor Authentication works by requiring two or more of the follo
3131

3232
Azure AD Multi-Factor Authentication can also further secure password reset. When users register themselves for Azure AD Multi-Factor Authentication, they can also register for self-service password reset in one step. Administrators can choose forms of secondary authentication and configure challenges for MFA based on configuration decisions.
3333

34-
You don't need to change apps and services to use Azure AD Multi-Factor Authentication. The verification prompts are part of the Azure AD sign-in, which automatically requests and processes the MFA challenge when needed.
34+
You don't need to change apps and services to use Azure AD Multi-Factor Authentication. The verification prompts are part of the Azure AD sign-in, which automatically requests and processes the MFA challenge when needed.
35+
36+
>[!NOTE]
37+
>The prompt language is determined by browser locale settings. If you use custom greetings but don’t have one for the language identified in the browser locale, English is used by default. Network Policy Server (NPS) will always use English by default, regardless of custom greetings. English is also used by default if the browser locale can't be identified.
3538
3639
![MFA sign-in screen.](media/concept-mfa-howitworks/sign-in-screen.png)
3740

articles/active-directory/devices/azuread-join-sso.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: conceptual
9-
ms.date: 10/26/2021
9+
ms.date: 02/07/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,26 +17,28 @@ ms.collection: M365-identity-device-management
1717
---
1818
# How SSO to on-premises resources works on Azure AD joined devices
1919

20-
It is probably not a surprise that an Azure Active Directory (Azure AD) joined device gives you a single sign-on (SSO) experience to your tenant's cloud apps. If your environment has an on-premises Active Directory (AD), you can also get SSO experience on Azure AD joined devices to resources and applications that rely on on-premises AD.
20+
It's probably not a surprise that an Azure Active Directory (Azure AD) joined device gives you a single sign-on (SSO) experience to your tenant's cloud apps. If your environment has an on-premises Active Directory (AD), you can also get SSO experience on Azure AD joined devices to resources and applications that rely on on-premises AD.
2121

2222
This article explains how this works.
2323

2424
## Prerequisites
2525

26-
On-premises SSO requires line-of-sight communication with your on-premises AD DS domain controllers. If Azure AD joined devices are not connected to your organization's network, a VPN or other network infrastructure is required.
26+
- An [Azure AD joined device](concept-azure-ad-join.md).
27+
- On-premises SSO requires line-of-sight communication with your on-premises AD DS domain controllers. If Azure AD joined devices aren't connected to your organization's network, a VPN or other network infrastructure is required.
28+
- Azure AD Connect: To synchronize default user attributes like SAM Account Name, Domain Name, and UPN. For more information, see the article [Attributes synchronized by Azure AD Connect](../hybrid/reference-connect-sync-attributes-synchronized.md#windows-10).
2729

2830
## How it works
2931

3032
With an Azure AD joined device, your users already have an SSO experience to the cloud apps in your environment. If your environment has an Azure AD and an on-premises AD, you may want to expand the scope of your SSO experience to your on-premises Line Of Business (LOB) apps, file shares, and printers.
3133

3234
Azure AD joined devices have no knowledge about your on-premises AD environment because they aren't joined to it. However, you can provide additional information about your on-premises AD to these devices with Azure AD Connect.
3335

34-
If you have a hybrid environment, with both Azure AD and on-premises AD, it is likely that you already have Azure AD Connect or Azure AD Connect cloud sync deployed to synchronize your on-premises identity information to the cloud. As part of the synchronization process, on-premises user and domain information is synchronized to Azure AD. When a user signs in to an Azure AD joined device in a hybrid environment:
36+
If you have a hybrid environment, with both Azure AD and on-premises AD, it's likely that you already have Azure AD Connect or Azure AD Connect cloud sync deployed to synchronize your on-premises identity information to the cloud. As part of the synchronization process, on-premises user and domain information is synchronized to Azure AD. When a user signs in to an Azure AD joined device in a hybrid environment:
3537

3638
1. Azure AD sends the details of the user's on-premises domain back to the device, along with the [Primary Refresh Token](concept-primary-refresh-token.md)
3739
1. The local security authority (LSA) service enables Kerberos and NTLM authentication on the device.
3840

39-
>[!NOTE]
41+
> [!NOTE]
4042
> Windows Hello for Business requires additional configuration to enable on-premises SSO from an Azure AD joined device. For more information, see [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base).
4143
>
4244
> FIDO2 security key based passwordless authentication with Windows 10 requires additional configuration to enable on-premises SSO from an Azure AD joined device. For more information, see [Enable passwordless security key sign-in to on-premises resources with Azure Active Directory](../authentication/howto-authentication-passwordless-security-key-on-premises.md).
@@ -64,7 +66,7 @@ You can use:
6466

6567
## What you should know
6668

67-
You may have to adjust your [domain-based filtering](../hybrid/how-to-connect-sync-configure-filtering.md#domain-based-filtering) in Azure AD Connect to ensure that the data about the required domains is synchronized.
69+
You may have to adjust your [domain-based filtering](../hybrid/how-to-connect-sync-configure-filtering.md#domain-based-filtering) in Azure AD Connect to ensure that the data about the required domains is synchronized if you have multiple domains.
6870

6971
Apps and resources that depend on Active Directory machine authentication don't work because Azure AD joined devices don't have a computer object in AD.
7072

articles/active-directory/devices/concept-azure-ad-join.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: conceptual
9-
ms.date: 01/26/2022
9+
ms.date: 02/07/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -25,7 +25,7 @@ Any organization can deploy Azure AD joined devices no matter the size or indust
2525
| **Primary audience** | Suitable for both cloud-only and hybrid organizations. |
2626
| | Applicable to all users in an organization |
2727
| **Device ownership** | Organization |
28-
| **Operating Systems** | All Windows 10 devices except Windows 10 Home |
28+
| **Operating Systems** | All Windows 11 and Windows 10 devices except Home editions |
2929
| | [Windows Server 2019 Virtual Machines running in Azure](howto-vm-sign-in-azure-ad-windows.md) (Server core isn't supported) |
3030
| **Provisioning** | Self-service: Windows Out of Box Experience (OOBE) or Settings |
3131
| | Bulk enrollment |
@@ -40,25 +40,32 @@ Any organization can deploy Azure AD joined devices no matter the size or indust
4040
| | Conditional Access through MDM enrollment and MDM compliance evaluation |
4141
| | [Self-service Password Reset and Windows Hello PIN reset on lock screen](../authentication/howto-sspr-windows.md) |
4242

43-
Azure AD joined devices are signed in to using an organizational Azure AD account. Access to resources in the organization can be further limited based on that Azure AD account and [Conditional Access policies](../conditional-access/howto-conditional-access-policy-compliant-device.md) applied to the device identity.
43+
Azure AD joined devices are signed in to using an organizational Azure AD account. Access to resources can be controlled based on Azure AD account and [Conditional Access policies](../conditional-access/howto-conditional-access-policy-compliant-device.md) applied to the device.
4444

45-
Administrators can secure and further control Azure AD joined devices using Mobile Device Management (MDM) tools like Microsoft Intune or in co-management scenarios using Microsoft Endpoint Configuration Manager. These tools provide a means to enforce organization-required configurations like requiring storage to be encrypted, password complexity, software installations, and software updates. Administrators can make organization applications available to Azure AD joined devices using Configuration Manager to [Manage apps from the Microsoft Store for Business and Education](/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business).
45+
Administrators can secure and further control Azure AD joined devices using Mobile Device Management (MDM) tools like Microsoft Intune or in co-management scenarios using Microsoft Endpoint Configuration Manager. These tools provide a means to enforce organization-required configurations like:
46+
47+
- Requiring storage to be encrypted
48+
- Password complexity
49+
- Software installation
50+
- Software updates
51+
52+
Administrators can make organization applications available to Azure AD joined devices using Configuration Manager to [Manage apps from the Microsoft Store for Business and Education](/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business).
4653

4754
Azure AD join can be accomplished using self-service options like the Out of Box Experience (OOBE), bulk enrollment, or [Windows Autopilot](/intune/enrollment-autopilot).
4855

4956
Azure AD joined devices can still maintain single sign-on access to on-premises resources when they are on the organization's network. Devices that are Azure AD joined can still authenticate to on-premises servers like file, print, and other applications.
5057

5158
## Scenarios
5259

53-
While Azure AD join can be used in a variety of scenarios like:
60+
Azure AD join can be used in various scenarios like:
5461

5562
- You want to transition to cloud-based infrastructure using Azure AD and MDM like Intune.
5663
- You can’t use an on-premises domain join, for example, if you need to get mobile devices such as tablets and phones under control.
5764
- Your users primarily need to access Microsoft 365 or other SaaS apps integrated with Azure AD.
5865
- You want to manage a group of users in Azure AD instead of in Active Directory. This scenario can apply, for example, to seasonal workers, contractors, or students.
5966
- You want to provide joining capabilities to workers who work from home or are in remote branch offices with limited on-premises infrastructure.
6067

61-
You can configure Azure AD join for all Windows 10 devices except for Windows 10 Home.
68+
You can configure Azure AD join for all Windows 11 and Windows 10 devices except for Home editions.
6269

6370
The goal of Azure AD joined devices is to simplify:
6471

0 commit comments

Comments
 (0)