Skip to content

Commit dd43047

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into probe-howto
2 parents 149d073 + 3426298 commit dd43047

22 files changed

+290
-144
lines changed

articles/active-directory/app-provisioning/functions-for-customizing-application-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1049,7 +1049,7 @@ Example: Based on the user's first name, middle name and last name, you need to
10491049
SingleAppRoleAssignment([appRoleAssignments])
10501050

10511051
**Description:**
1052-
Returns a single appRoleAssignment from the list of all appRoleAssignments assigned to a user for a given application. This function is required to convert the appRoleAssignments object into a single role name string. The best practice is to ensure only one appRoleAssignment is assigned to one user at a time, and if multiple roles are assigned the role string returned may not be predictable.
1052+
Returns a single appRoleAssignment from the list of all appRoleAssignments assigned to a user for a given application. This function is required to convert the appRoleAssignments object into a single role name string. The best practice is to ensure only one appRoleAssignment is assigned to one user at a time. This function is not supported in scenarios where users have multiple app role assignments.
10531053

10541054
**Parameters:**
10551055

articles/active-directory/manage-apps/f5-aad-integration.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ SHA addresses this blind spot by enabling organizations to continue using their
2424

2525
Having Azure AD pre-authenticate access to BIG-IP published services provides many benefits:
2626

27-
- Password-less authentication through [Windows Hello](/windows/security/identity-protection/hello-for-business/hello-overview), [MS Authenticator](https://support.microsoft.com/account-billing/download-and-install-the-microsoft-authenticator-app-351498fc-850a-45da-b7b6-27e523b8702a), [Fast Identity Online (FIDO) keys](../authentication/howto-authentication-passwordless-security-key.md), and [Certificate-based authentication](../authentication/active-directory-certificate-based-authentication-get-started.md)
27+
- Password-less authentication through [Windows Hello](/windows/security/identity-protection/hello-for-business/hello-overview), [MS Authenticator](https://support.microsoft.com/account-billing/download-and-install-the-microsoft-authenticator-app-351498fc-850a-45da-b7b6-27e523b8702a), [Fast Identity Online (FIDO) keys](../authentication/howto-authentication-passwordless-security-key.md), and [Certificate-based authentication](../authentication/concept-certificate-based-authentication.md)
2828

2929
- Preemptive [Conditional Access](../conditional-access/overview.md) and [Azure AD Multi-Factor Authentication (MFA)](../authentication/concept-mfa-howitworks.md)
3030

@@ -174,13 +174,13 @@ Azure AD B2B guest access to SHA protected applications is also possible, but so
174174

175175
## Next steps
176176

177-
Consider running an SHA Proof of concept (POC) using your existing BIG-IP infrastructure, or by [Deploying a BIG-IP Virtual Edition (VE) VM into Azure](f5-bigip-deployment-guide.md) takes approximately 30 minutes, at which point you'll have:
177+
Consider running a SHA Proof of concept (POC) using your existing BIG-IP infrastructure, or by [Deploying a BIG-IP Virtual Edition (VE) VM into Azure](f5-bigip-deployment-guide.md). Deploying a VM in Azure takes approximately 30 minutes, at which point you'll have:
178178

179-
- A fully secured platform to model a SHA proof of concept
179+
- A fully secured platform to model a SHA pilot
180180

181181
- A pre-production instance for testing new BIG-IP system updates and hotfixes
182182

183-
At the same time, you should identify one or two applications that can be published via the BIG-IP and protected with SHA.
183+
You should should also identify one or two applications that can be published via the BIG-IP and protected with SHA.
184184

185185
Our recommendation is to start with an application that isn’t yet published via a BIG-IP, so as to avoid potential disruption to production services. The guidelines mentioned in this article will help you get acquainted with the general procedure for creating the various BIG-IP configuration objects and setting up SHA. Once complete you should be able to do the same with any other new services, plus also have enough knowledge to convert existing BIG-IP published services over to SHA with minimal effort.
186186

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
---
2+
title: Azure Active Directory recommendation - Migrate to Microsoft authenticator | Microsoft Docs
3+
description: Learn why you should migrate your users to the Microsoft authenticator app in Azure AD.
4+
services: active-directory
5+
documentationcenter: ''
6+
author: MarkusVi
7+
manager: karenhoran
8+
editor: ''
9+
10+
ms.assetid: 9b88958d-94a2-4f4b-a18c-616f0617a24e
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.tgt_pltfrm: na
14+
ms.workload: identity
15+
ms.subservice: report-monitor
16+
ms.date: 03/02/2022
17+
ms.author: markvi
18+
ms.reviewer: hafowler
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Azure AD recommendation: Migrate to Microsoft authenticator
24+
25+
[Azure AD recommendations](overview-recommendations.md) is a feature that provides you with personalized insights and actionable guidance to align your tenant with recommended best practices.
26+
27+
This article covers the recommendation to migrate users to authenticator.
28+
29+
30+
## Description
31+
32+
Multi-factor authentication (MFA) is a key component to improve the security posture of your Azure AD tenant. However, while keeping your tenant safe is important, you should also keep an eye on keeping the security related overhead as little as possible on your users.
33+
34+
One possibility to accomplish this goal is to migrate users using SMS or voice call for MFA to use the Microsoft authenticator app.
35+
36+
37+
## Logic
38+
39+
If Azure AD detects that your tenant has users authenticating using SMS or voice in the past week instead of the authenticator app, this recommendation shows up.
40+
41+
## Value
42+
43+
- Push notifications through the Microsoft authenticator app provide the least intrusive MFA experience for users. This is the most reliable and secure option because it relies on a data connection rather than telephony.
44+
- Verification code option using Microsoft authenticator app enables MFA even in isolated environments without data or cellular signals where SMS and Voice calls would not work.
45+
- The Microsoft authenticator app is available for Android and iOS.
46+
- Pathway to passwordless: Authenticator can be a traditional MFA factor (one-time passcodes, push notification) and when your organization is ready for Password-less, the authenticator app can be used sign-into Azure AD without a password.
47+
48+
## Action plan
49+
50+
1. Ensure that notification through mobile app and/or verification code from mobile app are available to users as authentication methods. How to Configure Verification Options
51+
52+
2. Educate users on how to add a work or school account.
53+
54+
55+
56+
57+
58+
## Next steps
59+
60+
- [Tutorials for integrating SaaS applications with Azure Active Directory](../saas-apps/tutorial-list.md)
61+
- [Azure AD reports overview](overview-reports.md)

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,3 +136,5 @@
136136
items:
137137
- name: Integrate your third party apps
138138
href: recommendation-integrate-third-party-apps.md
139+
- name: Migrate to Microsoft authenticator
140+
href: recommendation-migrate-to-authenticator.md

articles/bastion/bastion-create-host-powershell.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
22
title: 'Deploy Bastion:PowerShell'
3+
titleSuffix: Azure Bastion
34
description: Learn how to deploy Azure Bastion using PowerShell.
45
author: cherylmc
56
ms.service: bastion
@@ -20,7 +21,7 @@ You can also deploy Bastion by using the following other methods:
2021

2122
* [Azure portal](./tutorial-create-host-portal.md)
2223
* [Azure CLI](create-host-cli.md)
23-
* [ Quickstart - deploy with default settings](quickstart-host-portal.md)
24+
* [Quickstart - deploy with default settings](quickstart-host-portal.md)
2425

2526
## Prerequisites
2627

@@ -64,10 +65,6 @@ This section helps you deploy Azure Bastion using Azure PowerShell.
6465
$bastion = New-AzBastion -ResourceGroupName "myBastionRG" -Name "myBastion" -PublicIpAddress $publicip -VirtualNetwork $vnet
6566
```
6667

67-
## <a name="ip"></a>Disassociate VM public IP address
68-
69-
Azure Bastion doesn't use the public IP address to connect to the client VM. If you don't need the public IP address for your VM, you can disassociate the public IP address. See [Dissociate a public IP address from an Azure VM](../virtual-network/ip-services/remove-public-ip-address-vm.md).
70-
7168
## <a name="connect"></a>Connect to a VM
7269

7370
You can use any of the following articles to connect to a VM that's located in the virtual network to which you deployed Bastion. You can also use the [Connection steps](#steps) in the section below. Some connection types require the [Standard SKU](configuration-settings.md#skus).
@@ -76,7 +73,11 @@ You can use any of the following articles to connect to a VM that's located in t
7673

7774
### <a name="steps"></a>Connection steps
7875

79-
[!INCLUDE [Links to Connect to VM articles](../../includes/bastion-vm-connect.md)]
76+
[!INCLUDE [Connection steps](../../includes/bastion-vm-connect.md)]
77+
78+
## <a name="ip"></a>Remove VM public IP address
79+
80+
Azure Bastion doesn't use the public IP address to connect to the client VM. If you don't need the public IP address for your VM, you can disassociate the public IP address. See [Dissociate a public IP address from an Azure VM](../virtual-network/ip-services/remove-public-ip-address-vm.md).
8081

8182
## Next steps
8283

0 commit comments

Comments
 (0)