You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/identity-provider-azure-ad-multi-tenant.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -145,7 +145,7 @@ You can define Azure AD as a claims provider by adding Azure AD to the **ClaimsP
145
145
```
146
146
147
147
1. Under the **ClaimsProvider** element, update the value for **Domain** to a unique value that can be used to distinguish it from other identity providers.
148
-
1. Under the **TechnicalProfile** element, update the value for **DisplayName**, for example, `Contoso Employee`. This value is displayed on the sign-in button on your sign-in page.
148
+
1. Under the **TechnicalProfile** element, update the value for **DisplayName**, for example, `Multi-Tenant AAD`. This value is displayed on the sign-in button on your sign-in page.
149
149
1. Set **client_id** to the application ID of the Azure AD multi-tenant application that you registered earlier.
150
150
1. Under **CryptographicKeys**, update the value of **StorageReferenceId** to the name of the policy key that created earlier. For example, `B2C_1A_AADAppSecret`.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-authentication-passwordless.md
+11-4Lines changed: 11 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: conceptual
9
-
ms.date: 05/07/2021
9
+
ms.date: 06/10/2021
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -107,14 +107,21 @@ The following process is used when a user signs in with a FIDO2 security key:
107
107
108
108
While there are many keys that are FIDO2 certified by the FIDO Alliance, Microsoft requires some optional extensions of the FIDO2 Client-to-Authenticator Protocol (CTAP) specification to be implemented by the vendor to ensure maximum security and the best experience.
109
109
110
-
A security key **MUST** implement the following features and extensions from the FIDO2 CTAP protocol to be Microsoft-compatible:
110
+
A security key **must** implement the following features and extensions from the FIDO2 CTAP protocol to be Microsoft-compatible. For more information, see the [Client to Authenticator Protocol](https://fidoalliance.org/specs/fido-v2.1-rd-20210309/fido-client-to-authenticator-protocol-v2.1-rd-20210309.html).
111
111
112
112
| # | Feature / Extension trust | Why is this feature or extension required? |
113
113
| --- | --- | --- |
114
-
| 1 | Resident key | This feature enables the security key to be portable, where your credential is stored on the security key. |
115
-
| 2 | Client pin | This feature enables you to protect your credentials with a second factor and applies to security keys that do not have a user interface. |
114
+
| 1 | Resident/Discoverable key | This feature enables the security key to be portable, where your credential is stored on the security key and is discoverable which makes usernameless flows possible. |
115
+
| 2 | Client pin | This feature enables you to protect your credentials with a second factor and applies to security keys that do not have a user interface.<br>Both [PIN protocol 1](https://fidoalliance.org/specs/fido-v2.1-rd-20210309/fido-client-to-authenticator-protocol-v2.1-rd-20210309.html#pinProto1) and [PIN protocol 2](https://fidoalliance.org/specs/fido-v2.1-rd-20210309/fido-client-to-authenticator-protocol-v2.1-rd-20210309.html#pinProto2)**must** be implemented.|
116
116
| 3 | hmac-secret | This extension ensures you can sign in to your device when it's off-line or in airplane mode. |
117
117
| 4 | Multiple accounts per RP | This feature ensures you can use the same security key across multiple services like Microsoft Account and Azure Active Directory. |
118
+
| 5 | Credential Management | This feature allows users to manage their credentials on security keys on platforms and applies to security keys that do not have this capability built-in. |
119
+
| 6 | Bio Enrollment | This feature allows users to enroll their biometrics on their authenticators and applies to security keys that do not have this capability built in.<br> Authenticator **must** implement [authenicatorBioEnrollment](https://fidoalliance.org/specs/fido-v2.1-rd-20210309/fido-client-to-authenticator-protocol-v2.1-rd-20210309.html#authenticatorBioEnrollment) command for this feature. Authenticator vendors are highly encouraged to implement [userVerificationMgmtPreview](https://fidoalliance.org/specs/fido-v2.1-rd-20210309/fido-client-to-authenticator-protocol-v2.1-rd-20210309.html#prototypeAuthenticatorBioEnrollment) command also so that users can enroll bio templates it on all previous OS versions. |
120
+
| 7 | pinUvAuthToken | This feature allows platform to have auth tokens using PIN or BIO match which helps in better user experience when multiple credentials are present on the authenticator. |
121
+
| 8 | forcePinChange | This feature allows enterprises to ask users to change their PIN in remote deployments. |
122
+
| 9 | setMinPINLength | This feature allows enterprises to have custom minimum PIN length for their users. Authenticator MUST implement minPinLength extension also. |
123
+
| 10 | alwaysUV | This feature allows enterprises or users to always require user verification to use this security key. Authenticator MUST implement toggleAlwaysUv subcommand. |
124
+
| 11 | credBlob | This extension allows websites to store small information along with the security key. |
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-sms-signin.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,14 +35,15 @@ To complete this article, you need the following resources and privileges:
35
35
*[Enterprise Mobility + Security (EMS) E3 or E5][ems-licensing] or [Microsoft 365 (M365) E3 or E5][m365-licensing]
36
36
*[Office 365 F3][o365-f3]
37
37
38
-
## Limitations
38
+
## Known issues
39
39
40
-
The following limitations apply to SMS-based authentication:
40
+
Here are some known issues:
41
41
42
42
* SMS-based authentication isn't currently compatible with Azure AD Multi-Factor Authentication.
43
43
* Except for Teams, SMS-based authentication isn't compatible with native Office applications.
44
44
* SMS-based authentication isn't recommended for B2B accounts.
45
45
* Federated users won't authenticate in the home tenant. They only authenticate in the cloud.
46
+
* If a user's default sign-in method is a text or call to your phone number, then the SMS code or voice call is sent automatically during multifactor authentication. As of June 2021, some apps will ask users to choose **Text** or **Call** first. This option prevents sending too many security codes for different apps. If the default sign-in method is the Microsoft Authenticator app ([which we highly recommend](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/it-s-time-to-hang-up-on-phone-transports-for-authentication/ba-p/1751752)), then the app notification is sent automatically.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-claims-mapping.md
+21-19Lines changed: 21 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Customize Azure AD tenant app claims (PowerShell)
3
3
titleSuffix: Microsoft identity platform
4
-
description: This page describes Azure Active Directory claims mapping.
4
+
description: Learn how to customize claims emitted in tokens for an application in a specific Azure Active Directory tenant.
5
5
services: active-directory
6
6
author: rwike77
7
7
manager: CelesteDG
@@ -10,32 +10,34 @@ ms.subservice: develop
10
10
ms.custom: aaddev
11
11
ms.workload: identity
12
12
ms.topic: how-to
13
-
ms.date: 08/25/2020
13
+
ms.date: 06/10/2021
14
14
ms.author: ryanwi
15
15
ms.reviewer: paulgarn, hirsin, jeedes, luleon
16
16
---
17
17
18
-
# How to: Customize claims emitted in tokens for a specific app in a tenant (Preview)
18
+
# Customize claims emitted in tokens for a specific app in a tenant
19
19
20
-
> [!NOTE]
21
-
> This feature replaces and supersedes the [claims customization](active-directory-saml-claims-customization.md) offered through the portal today. On the same application, if you customize claims using the portal in addition to the Graph/PowerShell method detailed in this document, tokens issued for that application will ignore the configuration in the portal. Configurations made through the methods detailed in this document will not be reflected in the portal.
20
+
Claims customization is used by tenant admins to customize the claims emitted in tokens for a specific application in their tenant. You can use claims-mapping policies to:
22
21
23
-
> [!NOTE]
24
-
> This capability currently is in public preview. Be prepared to revert or remove any changes. The feature is available in any Azure Active Directory (Azure AD) subscription during public preview. However, when the feature becomes generally available, some aspects of the feature might require an Azure AD premium subscription. This feature supports configuring claim mapping policies for WS-Fed, SAML, OAuth, and OpenID Connect protocols.
22
+
- select which claims are included in tokens.
23
+
- create claim types that do not already exist.
24
+
- choose or change the source of data emitted in specific claims.
25
25
26
-
This feature is used by tenant admins to customize the claims emitted in tokens for a specific application in their tenant. You can use claims-mapping policies to:
26
+
Claims customization supports configuring claim-mapping policies for the WS-Fed, SAML, OAuth, and OpenID Connect protocols.
27
27
28
-
- Select which claims are included in tokens.
29
-
- Create claim types that do not already exist.
30
-
- Choose or change the source of data emitted in specific claims.
28
+
> [!NOTE]
29
+
> This feature replaces and supersedes the [claims customization](active-directory-saml-claims-customization.md) offered through the Azure portal. On the same application, if you customize claims using the portal in addition to the Microsoft Graph/PowerShell method detailed in this document, tokens issued for that application will ignore the configuration in the portal. Configurations made through the methods detailed in this document will not be reflected in the portal.
31
30
32
-
In this article, we walk through a few common scenarios that can help you grasp how to use the [claimsmapping policy type](reference-claims-mapping-policy-type.md).
31
+
In this article, we walk through a few common scenarios that can help you grasp how to use the [claims-mapping policy type](reference-claims-mapping-policy-type.md).
33
32
34
-
When creating a claimsmapping policy, you can also emit a claim from a directory schema extension attribute in tokens. Use *ExtensionID* for the extension attribute instead of *ID* in the `ClaimsSchema` element. For more info on extension attributes, see [Using directory schema extension attributes](active-directory-schema-extensions.md).
33
+
When creating a claims-mapping policy, you can also emit a claim from a directory schema extension attribute in tokens. Use *ExtensionID* for the extension attribute instead of *ID* in the `ClaimsSchema` element. For more info on extension attributes, see [Using directory schema extension attributes](active-directory-schema-extensions.md).
35
34
36
35
## Prerequisites
37
36
38
-
In the following examples, you create, update, link, and delete policies for service principals. Claims mapping policies can only be assigned to service principal objects. If you are new to Azure AD, we recommend that you [learn about how to get an Azure AD tenant](quickstart-create-new-tenant.md) before you proceed with these examples.
37
+
In the following examples, you create, update, link, and delete policies for service principals. claims-mapping policies can only be assigned to service principal objects. If you are new to Azure AD, we recommend that you [learn about how to get an Azure AD tenant](quickstart-create-new-tenant.md) before you proceed with these examples.
38
+
39
+
> [!NOTE]
40
+
> The [Azure AD PowerShell Module public preview release](https://www.powershellgallery.com/packages/AzureADPreview) is required to configure claims-mapping policies. The PowerShell module is in preview, be prepared to revert or remove any changes.
39
41
40
42
To get started, do the following steps:
41
43
@@ -55,7 +57,7 @@ To get started, do the following steps:
55
57
56
58
In this example, you create a policy that removes the [basic claim set](reference-claims-mapping-policy-type.md#claim-sets) from tokens issued to linked service principals.
57
59
58
-
1. Create a claimsmapping policy. This policy, linked to specific service principals, removes the basic claim set from tokens.
60
+
1. Create a claims-mapping policy. This policy, linked to specific service principals, removes the basic claim set from tokens.
59
61
1. To create the policy, run this command:
60
62
61
63
```powershell
@@ -78,7 +80,7 @@ In this example, you create a policy that removes the [basic claim set](referenc
78
80
79
81
In this example, you create a policy that adds the EmployeeID and TenantCountry to tokens issued to linked service principals. The EmployeeID is emitted as the name claim type in both SAML tokens and JWTs. The TenantCountry is emitted as the country/region claim type in both SAML tokens and JWTs. In this example, we continue to include the basic claims set in the tokens.
80
82
81
-
1. Create a claimsmapping policy. This policy, linked to specific service principals, adds the EmployeeID and TenantCountry claims to tokens.
83
+
1. Create a claims-mapping policy. This policy, linked to specific service principals, adds the EmployeeID and TenantCountry claims to tokens.
82
84
1. To create the policy, run the following command:
83
85
84
86
``` powershell
@@ -102,7 +104,7 @@ In this example, you create a policy that adds the EmployeeID and TenantCountry
102
104
103
105
In this example, you create a policy that emits a custom claim "JoinedData" to JWTs issued to linked service principals. This claim contains a value created by joining the data stored in the extensionattribute1 attribute on the user object with ".sandbox". In this example, we exclude the basic claims set in the tokens.
104
106
105
-
1. Create a claimsmapping policy. This policy, linked to specific service principals, adds the EmployeeID and TenantCountry claims to tokens.
107
+
1. Create a claims-mapping policy. This policy, linked to specific service principals, adds the EmployeeID and TenantCountry claims to tokens.
106
108
1. To create the policy, run the following command:
107
109
108
110
``` powershell
@@ -124,7 +126,7 @@ In this example, you create a policy that emits a custom claim "JoinedData" to J
124
126
125
127
## Security considerations
126
128
127
-
Applications that receive tokens rely on the fact that the claim values are authoritatively issued by Azure AD and cannot be tampered with. However, when you modify the token contents via claimsmapping policies, these assumptions may no longer be correct. Applications must explicitly acknowledge that tokens have been modified by the creator of the claimsmapping policy to protect themselves from claimsmapping policies created by malicious actors. This can be done in the following ways:
129
+
Applications that receive tokens rely on the fact that the claim values are authoritatively issued by Azure AD and cannot be tampered with. However, when you modify the token contents through claims-mapping policies, these assumptions may no longer be correct. Applications must explicitly acknowledge that tokens have been modified by the creator of the claims-mapping policy to protect themselves from claims-mapping policies created by malicious actors. This can be done in the following ways:
128
130
129
131
- Configure a custom signing key
130
132
- Update the application manifest to accept mapped claims.
@@ -151,6 +153,6 @@ If you're not using a verified domain, Azure AD will return an `AADSTS501461` er
151
153
152
154
## Next steps
153
155
154
-
- Read the [claimsmapping policy type](reference-claims-mapping-policy-type.md) reference article to learn more.
156
+
- Read the [claims-mapping policy type](reference-claims-mapping-policy-type.md) reference article to learn more.
155
157
- To learn how to customize claims issued in the SAML token through the Azure portal, see [How to: Customize claims issued in the SAML token for enterprise applications](active-directory-saml-claims-customization.md)
156
158
- To learn more about extension attributes, see [Using directory schema extension attributes in claims](active-directory-schema-extensions.md).
The custom property name can be found in the directory by querying a user's property using Graph Explorer and searching for the property name. Also, you can now select **Get custom extension properties** link in the dynamic user group rule builder to enter a unique app ID and receive the full list of custom extension properties to use when creating a dynamic membership rule. This list can also be refreshed to get any new custom extension properties for that app.
364
+
The custom property name can be found in the directory by querying a user's property using Graph Explorer and searching for the property name. Also, you can now select **Get custom extension properties** link in the dynamic user group rule builder to enter a unique app ID and receive the full list of custom extension properties to use when creating a dynamic membership rule. This list can also be refreshed to get any new custom extension properties for that app.
365
+
366
+
For more information, see [Use the attributes in dynamic groups](../hybrid/how-to-connect-sync-feature-directory-extensions.md#use-the-attributes-in-dynamic-groups) in the article [Azure AD Connect sync: Directory extensions](../hybrid/how-to-connect-sync-feature-directory-extensions.md).
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/reference-connect-version-history.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,12 +87,13 @@ Please follow this link to read more about [auto upgrade](how-to-connect-install
87
87
- Added member attribute to the 'Out to AD - Group SOAInAAD - Exchange' rule to limit members in written back groups to 50k
88
88
- Updated Sync Rules to support Group Writeback v2
89
89
-If the “In from AAD - Group SOAInAAD” rule is cloned and AADConnect is upgraded.
90
-
-The updated rule will be disabled by default and so the targetWritebackType will be null.
90
+
-The updated rule will be disabled by default and so the targetWritebackType will be null.
91
91
- AADConnect will writeback all Cloud Groups (including Azure Active Directory Security Groups enabled for writeback) as Distribution Groups.
92
92
-If the “Out to AD - Group SOAInAAD” rule is cloned and AADConnect is upgraded.
93
93
- The updated rule will be disabled by default. However, a new sync rule “Out to AD - Group SOAInAAD - Exchange” which is added will be enabled.
94
94
- Depending on the Cloned Custom Sync Rule's precedence, AADConnect will flow the Mail and Exchange attributes.
95
95
- If the Cloned Custom Sync Rule does not flow some Mail and Exchange attributes, then new Exchange Sync Rule will add those attributes.
96
+
- Note that Group Writeback V2 is in private preview at this moment and not publicly available.
96
97
- Added support for [Selective Password hash Synchronization](./how-to-connect-selective-password-hash-synchronization.md)
97
98
- Added the new [Single Object Sync cmdlet](./how-to-connect-single-object-sync.md). Use this cmdlet to troubleshoot your Azure AD Connect sync configuration.
98
99
- Azure AD Connect now supports the Hybrid Identity Administrator role for configuring the service.
0 commit comments