You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This table shows support for authenticating Azure Active Directory (Azure AD) and Microsoft Accounts (MSA). Microsoft accounts are created by consumers for services such as Xbox, Skype, or Outlook.com. Supported device types include **USB**, near-field communication (**NFC**), and bluetooth low energy (**BLE**).
24
+
This table shows support for authenticating Azure Active Directory (Azure AD) and Microsoft Accounts (MSA). Microsoft accounts are created by consumers for services such as Xbox, Skype, or Outlook.com.
|| USB | NFC | BLE | USB | NFC | BLE | USB | NFC | BLE | USB | NFC | BLE |
29
-
|**Windows**|![Chrome supports USB on Windows for Azure AD accounts.][y]|![Chrome supports NFC on Windows for Azure AD accounts.][y]|![Chrome supports BLE on Windows for Azure AD accounts.][y]|![Edge supports USB on Windows for Azure AD accounts.][y]|![Edge supports NFC on Windows for Azure AD accounts.][y]|![Edge supports BLE on Windows for Azure AD accounts.][y]|![Firefox supports USB on Windows for Azure AD accounts.][y]|![Firefox supports NFC on Windows for Azure AD accounts.][y]|![Firefox supports BLE on Windows for Azure AD accounts.][y]|![Safari supports USB on Windows for Azure AD accounts.][n]|![Safari supports NFC on Windows for Azure AD accounts.][n]|![Safari supports BLE on Windows for Azure AD accounts.][n]|
30
-
|**macOS**|![Chrome supports USB on macOS for Azure AD accounts.][y]|![Chrome supports NFC on macOS for Azure AD accounts.][n]|![Chrome supports BLE on macOS for Azure AD accounts.][n]|![Edge supports USB on macOS for Azure AD accounts.][y]|![Edge supports NFC on macOS for Azure AD accounts.][n]|![Edge supports BLE on macOS for Azure AD accounts.][n]|![Firefox supports USB on macOS for Azure AD accounts.][n]|![Firefox supports NFC on macOS for Azure AD accounts.][n]|![Firefox supports BLE on macOS for Azure AD accounts.][n]|![Safari supports USB on macOS for Azure AD accounts.][y]|![Safari supports NFC on macOS for Azure AD accounts.][n]|![Safari supports BLE on macOS for Azure AD accounts.][n]|
31
-
|**ChromeOS**|![Chrome supports USB on ChromeOS for Azure AD accounts.][y]|![Chrome supports NFC on ChromeOS for Azure AD accounts.][n]|![Chrome supports BLE on ChromeOS for Azure AD accounts.][n]|![Edge supports USB on ChromeOS for Azure AD accounts.][n]|![Edge supports NFC on ChromeOS for Azure AD accounts.][n]|![Edge supports BLE on ChromeOS for Azure AD accounts.][n]|![Firefox supports USB on ChromeOS for Azure AD accounts.][n]|![Firefox supports NFC on ChromeOS for Azure AD accounts.][n]|![Firefox supports BLE on ChromeOS for Azure AD accounts.][n]|![Safari supports USB on ChromeOS for Azure AD accounts.][n]|![Safari supports NFC on ChromeOS for Azure AD accounts.][n]|![Safari supports BLE on ChromeOS for Azure AD accounts.][n]|
32
-
|**Linux**|![Chrome supports USB on Linux for Azure AD accounts.][y]|![Chrome supports NFC on Linux for Azure AD accounts.][n]|![Chrome supports BLE on Linux for Azure AD accounts.][n]|![Edge supports USB on Linux for Azure AD accounts.][n]|![Edge supports NFC on Linux for Azure AD accounts.][n]|![Edge supports BLE on Linux for Azure AD accounts.][n]|![Firefox supports USB on Linux for Azure AD accounts.][n]|![Firefox supports NFC on Linux for Azure AD accounts.][n]|![Firefox supports BLE on Linux for Azure AD accounts.][n]|![Safari supports USB on Linux for Azure AD accounts.][n]|![Safari supports NFC on Linux for Azure AD accounts.][n]|![Safari supports BLE on Linux for Azure AD accounts.][n]|
33
-
|**iOS**|![Chrome supports USB on iOS for Azure AD accounts.][y]|![Chrome supports NFC on iOS for Azure AD accounts.][y]|![Chrome supports BLE on iOS for Azure AD accounts.][n]|![Edge supports USB on iOS for Azure AD accounts.][y]|![Edge supports NFC on iOS for Azure AD accounts.][y]|![Edge supports BLE on iOS for Azure AD accounts.][n]|![Firefox supports USB on Linux for Azure AD accounts.][n]|![Firefox supports NFC on iOS for Azure AD accounts.][n]|![Firefox supports BLE on iOS for Azure AD accounts.][n]|![Safari supports USB on iOS for Azure AD accounts.][y]|![Safari supports NFC on iOS for Azure AD accounts.][y]|![Safari supports BLE on iOS for Azure AD accounts.][n]|
34
-
|**Android**|![Chrome supports USB on Android for Azure AD accounts.][n]|![Chrome supports NFC on Android for Azure AD accounts.][n]|![Chrome supports BLE on Android for Azure AD accounts.][n]|![Edge supports USB on Android for Azure AD accounts.][n]|![Edge supports NFC on Android for Azure AD accounts.][n]|![Edge supports BLE on Android for Azure AD accounts.][n]|![Firefox supports USB on Android for Azure AD accounts.][n]|![Firefox supports NFC on Android for Azure AD accounts.][n]|![Firefox supports BLE on Android for Azure AD accounts.][n]|![Safari supports USB on Android for Azure AD accounts.][n]|![Safari supports NFC on Android for Azure AD accounts.][n]|![Safari supports BLE on Android for Azure AD accounts.][n]|
35
-
36
-
- Key registration is currently not supported with ChromeOS/Chrome Browser.
37
-
- For iOS and macOS on Safari browser, PIN requests fail if the PIN isn't already set on the security key.
38
-
- Security key PIN for user verification isn't currently supported with Android.
26
+
| OS | Chrome | Edge | Firefox | Safari |
27
+
|:---:|:------:|:----:|:-------:|:------:|
28
+
|**Windows**|✅|✅|✅| N/A |
29
+
|**macOS**|✅|✅|✅|✅|
30
+
|**ChromeOS**|✅| N/A | N/A | N/A |
31
+
|**Linux**|✅|❌|❌| N/A |
32
+
|**iOS**|✅|✅|✅|✅|
33
+
|**Android**|❌|❌|❌| N/A |
39
34
40
35
>[!NOTE]
41
-
>This is the view for web support. Authentication for native apps in iOS and Android are not available yet.
36
+
>This is the view for web support. Authentication for native apps in iOS and Android isn't available yet.
42
37
43
-
## Unsupported browsers
38
+
## Browser support for each platform
44
39
45
-
The following operating system and browser combinations aren't supported, but future support and testing is being investigated. If you would like to see other operating system and browser support, please leave feedback on our [product feedback site](https://feedback.azure.com/d365community/).
40
+
The following tables show which transports are supported for each platform. Supported device types include **USB**, near-field communication (**NFC**), and bluetooth low energy (**BLE**).
46
41
47
-
| Operating system | Browser |
48
-
| ---- | ---- |
49
-
| Android | Chrome |
42
+
### Windows
43
+
44
+
| Browser | USB | NFC | BLE |
45
+
|---------|------|-----|-----|
46
+
| Edge |✅|✅|✅|
47
+
| Chrome |✅|✅|✅|
48
+
| Firefox |✅|✅|✅|
49
+
50
+
### macOS
51
+
52
+
| Browser | USB | NFC<sup>1</sup> | BLE<sup>1</sup> |
53
+
|---------|------|-----|-----|
54
+
| Edge |✅| N/A | N/A |
55
+
| Chrome |✅| N/A | N/A |
56
+
| Firefox<sup>2</sup> |✅| N/A | N/A |
57
+
| Safari<sup>2</sup> |✅| N/A | N/A |
58
+
59
+
<sup>1</sup>NFC and BLE security keys aren't supported on macOS by Apple.
60
+
61
+
<sup>2</sup>New security key registration doesn't work on these macOS browsers because they don't prompt to set up biometrics or PIN.
62
+
63
+
### ChromeOS
64
+
65
+
| Browser<sup>1</sup> | USB | NFC | BLE |
66
+
|---------|------|-----|-----|
67
+
| Chrome |✅|❌|❌|
68
+
69
+
<sup>1</sup>Security key registration isn't supported on ChromeOS or Chrome browser.
<sup>1</sup>New security key registration doesn't work on iOS browsers because they don't prompt to set up biometrics or PIN.
90
+
91
+
<sup>2</sup>BLE security keys aren't supported on iOS by Apple.
92
+
93
+
### Android
94
+
95
+
| Browser<sup>1</sup> | USB | NFC | BLE |
96
+
|---------|------|-----|-----|
97
+
| Edge |❌|❌|❌|
98
+
| Chrome |❌|❌|❌|
99
+
| Firefox |❌|❌|❌|
100
+
101
+
<sup>1</sup>Security key biometrics or PIN for user verficiation isn't currently supported on Android by Google. Azure AD requires user verification for all FIDO2 authentications.
50
102
51
103
## Minimum browser version
52
104
@@ -58,7 +110,7 @@ The following are the minimum browser version requirements.
58
110
| Edge | Windows 10 version 1903<sup>1</sup> |
59
111
| Firefox | 66 |
60
112
61
-
<sup>1</sup>All versions of the new Chromium-based Microsoft Edge support Fido2. Support on Microsoft Edge legacy was added in 1903.
113
+
<sup>1</sup>All versions of the new Chromium-based Microsoft Edge support FIDO2. Support on Microsoft Edge legacy was added in 1903.
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: conditional-access
8
8
ms.topic: how-to
9
-
ms.date: 07/18/2023
9
+
ms.date: 07/26/2023
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -45,7 +45,7 @@ Organizations can choose to include or exclude roles as they see fit.
45
45
46
46
## Create a Conditional Access policy
47
47
48
-
The following steps will help create a Conditional Access policy to require those assigned administrative roles to perform multifactor authentication.
48
+
The following steps will help create a Conditional Access policy to require those assigned administrative roles to perform multifactor authentication. Some organizations may be ready to move to stronger authentication methods for their administrators. These organizations may choose to implement a policy like the one described in the article [Require phishing-resistant multifactor authentication for administrators](how-to-policy-phish-resistant-admin-mfa.md).
49
49
50
50
1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)** as a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
51
51
1. Browse to **Microsoft Entra ID (Azure AD)** > **Protection** > **Conditional Access**.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/connect/how-to-connect-install-prerequisites.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ We recommend that you harden your Azure AD Connect server to decrease the securi
78
78
- Create a [dedicated account for all personnel with privileged access](/windows-server/identity/securing-privileged-access/securing-privileged-access). Administrators shouldn't be browsing the web, checking their email, and doing day-to-day productivity tasks with highly privileged accounts.
79
79
- Follow the guidance provided in [Securing privileged access](/windows-server/identity/securing-privileged-access/securing-privileged-access).
80
80
- Deny use of NTLM authentication with the AADConnect server. Here are some ways to do this: [Restricting NTLM on the AADConnect Server](/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers) and [Restricting NTLM on a domain](/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain)
81
-
- Ensure every machine has a unique local administrator password. For more information, see [Local Administrator Password Solution (LAPS)](https://support.microsoft.com/help/3062591/microsoft-security-advisory-local-administrator-password-solution-laps) can configure unique random passwords on each workstation and server store them in Active Directory protected by an ACL. Only eligible authorized users can read or request the reset of these local administrator account passwords. You can obtain the LAPS for use on workstations and servers from the [Microsoft Download Center](https://www.microsoft.com/download/details.aspx?id=46899). Additional guidance for operating an environment with LAPS and privileged access workstations (PAWs) can be found in [Operational standards based on clean source principle](/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material#operational-standards-based-on-clean-source-principle).
81
+
- Ensure every machine has a unique local administrator password. For more information, see [Local Administrator Password Solution (Windows LAPS)](/windows-server/identity/laps/laps-overview) can configure unique random passwords on each workstation and server store them in Active Directory protected by an ACL. Only eligible authorized users can read or request the reset of these local administrator account passwords. Additional guidance for operating an environment with Windows LAPS and privileged access workstations (PAWs) can be found in [Operational standards based on clean source principle](/windows-server/identity/securing-privileged-access/securing-privileged-access-reference-material#operational-standards-based-on-clean-source-principle).
82
82
- Implement dedicated [privileged access workstations](https://4sysops.com/archives/understand-the-microsoft-privileged-access-workstation-paw-security-model/) for all personnel with privileged access to your organization's information systems.
83
83
- Follow these [additional guidelines](/windows-server/identity/ad-ds/plan/security-best-practices/reducing-the-active-directory-attack-surface) to reduce the attack surface of your Active Directory environment.
84
84
- Follow the [Monitor changes to federation configuration](how-to-connect-monitor-federation-changes.md) to set up alerts to monitor changes to the trust established between your Idp and Azure AD.
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/connect/reference-connect-version-history.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.topic: reference
9
9
ms.workload: identity
10
10
ms.date: 7/6/2022
11
11
ms.subservice: hybrid
12
-
ms.author: rodejo
12
+
ms.author: billmath
13
13
ms.custom: has-adal-ref
14
14
ms.collection: M365-identity-device-management
15
15
---
@@ -47,9 +47,6 @@ Required permissions | For permissions required to apply an update, see [Azure A
47
47
> Currently only builds 2.1.16.0 (release August 8th 2022) or later are supported.
48
48
>
49
49
> If you are not already using the latest release version of Azure AD Connect Sync, you should upgrade your Azure AD Connect Sync software before that date.
50
-
>
51
-
52
-
Rather than list all the versions which are retired I think its simpler just to list the ones which aren’t retired.
53
50
54
51
55
52
If you run a retired version of Azure AD Connect, it might unexpectedly stop working. You also might not have the latest security fixes, performance improvements, troubleshooting and diagnostic tools, and service enhancements. If you require support, we might not be able to provide you with the level of service your organization needs.
0 commit comments