You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/roles-resource-access-control.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
9
9
ms.service: active-directory
10
10
ms.workload: identity
11
11
ms.topic: conceptual
12
-
ms.date: 10/08/2021
12
+
ms.date: 11/25/2021
13
13
ms.author: kengaderdus
14
14
ms.subservice: B2C
15
15
---
@@ -20,7 +20,7 @@ When planning your access control strategy, it's best to assign users the least
20
20
|Resource |Description |Role |
21
21
|---------|---------|---------|
22
22
|[Application registrations](tutorial-register-applications.md)| Create and manage all aspects of your web, mobile, and native application registrations within Azure AD B2C.|[Application Administrator](../active-directory/roles/permissions-reference.md#application-administrator)|
23
-
|Tenant Creator| Create new Azure AD or Azure AD B2C tenants.||
23
+
|Tenant Creator| Create new Azure AD or Azure AD B2C tenants.|[Tenant Creator](../active-directory/roles/permissions-reference.md#tenant-creator)|
24
24
|[Identity providers](add-identity-provider.md)| Configure the [local identity provider](identity-provider-local.md) and external social or enterprise identity providers. |[External Identity Provider Administrator](../active-directory/roles/permissions-reference.md#external-identity-provider-administrator)|
25
25
|[API connectors](add-api-connector.md)| Integrate your user flows with web APIs to customize the user experience and integrate with external systems.|[External ID User Flow Administrator](../active-directory/roles/permissions-reference.md#external-id-user-flow-administrator)|
26
26
|[Company branding](customize-ui.md#configure-company-branding)| Customize your user flow pages.|[Global Administrator](../active-directory/roles/permissions-reference.md#global-administrator)|
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/whats-new-docs.md
+13Lines changed: 13 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,19 @@ manager: CelesteDG
15
15
16
16
Welcome to what's new in Azure Active Directory B2C documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the B2C service, see [What's new in Azure Active Directory](../active-directory/fundamentals/whats-new.md) and [Azure AD B2C developer release notes](custom-policy-developer-notes.md)
17
17
18
+
## November 2022
19
+
20
+
### New articles
21
+
22
+
-[Configure Azure Active Directory B2C with Akamai Enterprise Application Access for SSO and secure hybrid access](partner-akamai-secure-hybrid-access.md)
23
+
24
+
### Updated articles
25
+
26
+
-[Manage your Azure Active Directory B2C tenant](tenant-management.md)
27
+
-[Manage Azure AD B2C with Microsoft Graph](microsoft-graph-operations.md)
28
+
-[Tutorial: Create an Azure Active Directory B2C tenant](tutorial-create-tenant.md)
29
+
-[Roles and resource access control](roles-resource-access-control.md)
30
+
-[Define an Azure Active Directory technical profile in an Azure Active Directory B2C custom policy](active-directory-technical-profile.md)
Copy file name to clipboardExpand all lines: articles/active-directory-domain-services/policy-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Built-in policy definitions for Azure Active Directory Domain Services
3
3
description: Lists Azure Policy built-in policy definitions for Azure Active Directory Domain Services. These built-in policy definitions provide common approaches to managing your Azure resources.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/how-to-mfa-number-match.md
+28-72Lines changed: 28 additions & 72 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
4
4
ms.service: active-directory
5
5
ms.subservice: authentication
6
6
ms.topic: conceptual
7
-
ms.date: 11/11/2022
7
+
ms.date: 11/23/2022
8
8
ms.author: justinha
9
9
author: mjsantani
10
10
ms.collection: M365-identity-device-management
@@ -23,9 +23,6 @@ This topic covers how to enable number matching in Microsoft Authenticator push
23
23
24
24
- Your organization needs to enable Microsoft Authenticator (traditional second factor) push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
25
25
26
-
>[!NOTE]
27
-
>The policy schema for Microsoft Graph APIs has been improved. The older policy schema is now deprecated. Make sure you use the new schema to help prevent errors.
28
-
29
26
- If your organization is using AD FS adapter or NPS extensions, upgrade to the latest versions for a consistent experience.
30
27
31
28
## Number matching
@@ -40,9 +37,6 @@ Number matching is available for the following scenarios. When enabled, all scen
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
45
-
46
40
Number matching is available for sign-in for Azure Government. However, it's currently not available for Authenticator setup in combined registration. Number matching will be available for Authenticator setup in [combined registration](howto-registration-mfa-sspr-combined.md) by November 30, 2022 for Azure Government.
47
41
48
42
Number matching isn't supported for Apple Watch notifications. Apple Watch users need to use their phone to approve notifications when number matching is enabled.
@@ -67,9 +61,8 @@ The AD FS adapter supports number matching after installing an update. Unpatched
67
61
68
62
| Version | Update |
69
63
|---------|--------|
70
-
| Windows Server 2022 |[October 26, 2021—KB5006745 (OS Build 20348.320) Preview](https://support.microsoft.com/topic/october-26-2021-kb5006745-os-build-20348-320-preview-8ff9319a-19e7-40c7-bbd1-cd70fcca066c)|
71
-
| Windows Server 2019 |[October 19, 2021—KB5006744 (OS Build 17763.2268) Preview](https://support.microsoft.com/topic/october-19-2021-kb5006744-os-build-17763-2268-preview-e043a8a3-901b-4190-bb6b-f5a4137411c0)|
72
-
| Windows Server 2016 |[October 12, 2021—KB5006669 (OS Build 14393.4704)](https://support.microsoft.com/topic/october-12-2021-kb5006669-os-build-14393-4704-bcc95546-0768-49ae-bec9-240cc59df384)|
64
+
| Windows Server 2022 |[November 9, 2021—KB5007205 (OS Build 20348.350)](https://support.microsoft.com/topic/november-9-2021-kb5007205-os-build-20348-350-af102e6f-cc7c-4cd4-8dc2-8b08d73d2b31)|
65
+
| Windows Server 2019 |[November 9, 2021—KB5007206 (OS Build 17763.2300)](https://support.microsoft.com/topic/november-9-2021-kb5007206-os-build-17763-2300-c63b76fa-a9b4-4685-b17c-7d866bb50e48)|
73
66
74
67
75
68
### NPS extension
@@ -89,7 +82,22 @@ To create the registry key that overrides push notifications:
89
82
Value = TRUE
90
83
1. Restart the NPS Service.
91
84
92
-
### Policy schema changes
85
+
## Enable number matching in the portal
86
+
87
+
To enable number matching in the Azure AD portal, complete the following steps:
88
+
89
+
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
90
+
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone or add selected users and groups. Set the **Authentication mode** for these users/groups to **Any**/**Push**.
91
+
92
+
Only users who are enabled for Microsoft Authenticator here can be included in the policy to require number matching for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature.
93
+
94
+
:::image type="content" border="true" source="./media/how-to-mfa-number-match/enable-settings-number-match.png" alt-text="Screenshot of how to enable Microsoft Authenticator settings for Push authentication mode.":::
95
+
96
+
1. On the **Configure** tab, for **Require number matching for push notifications**, change **Status** to **Enabled**, choose who to include or exclude from number matching, and click **Save**.
97
+
98
+
:::image type="content" border="true" source="./media/how-to-mfa-number-match/number-match.png" alt-text="Screenshot of how to enable number matching.":::
99
+
100
+
## Enable number matching using Graph APIs
93
101
94
102
Identify your single target group for the schema configuration. Then use the following API endpoint to change the numberMatchingRequiredState property under featureSettings to **enabled**, and include or exclude groups:
>Make sure you use the new policy schema for Microsoft Graph APIs. In Graph Explorer, you'll need to consent to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
109
+
>In Graph Explorer, you'll need to consent to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
| includeTargets |[microsoftAuthenticatorAuthenticationMethodTarget](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) collection | A collection of users or groups who are enabled to use the authentication method |
118
126
| featureSettings |[microsoftAuthenticatorFeatureSettings](/graph/api/resources/passwordlessmicrosoftauthenticatorauthenticationmethodtarget) collection | A collection of Microsoft Authenticator features. |
| displayAppInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown application name in Microsoft Authenticator notification. |
140
148
| displayLocationInformationRequiredState | authenticationMethodFeatureConfiguration | Determines whether the user is shown geographic location context in Microsoft Authenticator notification. |
| includeTarget | featureTarget | A single entity that is included in this feature. <br>You can only include one group for number matching.|
150
158
| State | advancedConfigState | Possible values are:<br>**enabled** explicitly enables the feature for the selected group.<br>**disabled** explicitly disables the feature for the selected group.<br>**default** allows Azure AD to manage whether the feature is enabled or not for the selected group. |
To enable number matching in the Azure AD portal, complete the following steps:
343
-
344
-
1. In the Azure AD portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
345
-
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone or add selected users and groups. Set the **Authentication mode** for these users/groups to **Any**/**Push**.
346
-
347
-
Only users who are enabled for Microsoft Authenticator here can be included in the policy to require number matching for sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see the feature.
348
-
349
-
:::image type="content" border="true" source="./media/how-to-mfa-number-match/enable-settings-number-match.png" alt-text="Screenshot of how to enable Microsoft Authenticator settings for Push authentication mode.":::
350
-
351
-
1. On the **Configure** tab, for **Require number matching for push notifications**, change **Status** to **Enabled**, choose who to include or exclude from number matching, and click **Save**.
352
-
353
-
:::image type="content" border="true" source="./media/how-to-mfa-number-match/number-match.png" alt-text="Screenshot of how to enable number matching.":::
354
-
355
-
356
-
357
313
## FAQs
358
314
359
315
### When will my tenant see number matching if I don't use the Azure portal or Graph API to roll out the change?
0 commit comments