Skip to content

Commit e4d3de2

Browse files
committed
merge conflict
2 parents d665c5f + 82467c6 commit e4d3de2

File tree

175 files changed

+1643
-518
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

175 files changed

+1643
-518
lines changed

appgw-waf-metrics-1-expanded.png

108 KB
Loading

appgw-waf-metrics-2-expanded.png

93.5 KB
Loading

appgw-waf-metrics-2.png

55.6 KB
Loading

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
2-
title: Use additional context in multifactor authentication (MFA) notifications (Preview) - Azure Active Directory
2+
title: Use additional context in Microsoft Authenticator notifications (Preview) - Azure Active Directory
33
description: Learn how to use additional context in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 02/11/2022
7+
ms.date: 03/18/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
1111

1212
# Customer intent: As an identity administrator, I want to encourage users to use the Microsoft Authenticator app in Azure AD to improve and secure user sign-in events.
1313
---
14-
# How to use additional context in multifactor authentication (MFA) notifications (Preview) - Authentication Methods Policy
14+
# How to use additional context in Microsoft Authenticator notifications (Preview) - Authentication Methods Policy
1515

1616
This topic covers how to improve the security of user sign-in by adding application location based on IP address in Microsoft Authenticator push notifications.
1717

@@ -34,6 +34,9 @@ The additional context can be combined with [number matching](how-to-mfa-number-
3434

3535
### Policy schema changes
3636

37+
>[!NOTE]
38+
>In Graph Explorer, ensure you've consented to the **Policy.Read.All** and **Policy.ReadWrite.AuthenticationMethod** permissions.
39+
3740
Identify a single target group for the schema configuration. Then use the following API endpoint to change the displayAppInformationRequiredState property to **enabled**:
3841

3942
https://graph.microsoft.com/beta/authenticationMethodsPolicy/authenticationMethodConfigurations/MicrosoftAuthenticator

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 02/28/2022
7+
ms.date: 03/18/2022
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -38,7 +38,7 @@ Number matching is available for the following scenarios. When enabled, all scen
3838
- [NPS extension](howto-mfa-nps-extension.md)
3939

4040
>[!NOTE]
41-
>For passwordless users, enabling number matching has no impact because it's already part of the passwordless experience.
41+
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
4242
4343
### Multifactor authentication
4444

@@ -126,7 +126,7 @@ You will need to change the **numberMatchingRequiredState** from **default** to
126126
Note that the value of Authentication Mode can be either **any** or **push**, depending on whether or not you also want to enable passwordless phone sign-in. In these examples, we will use **any**, but if you do not want to allow passwordless, use **push**.
127127

128128
>[!NOTE]
129-
>For passwordless users, enabling number matching has no impact because it's already part of the passwordless experience.
129+
>For passwordless users, enabling or disabling number matching has no impact because it's already part of the passwordless experience.
130130
131131
You might need to patch the entire includeTarget to prevent overwriting any previous configuration. In that case, do a GET first, update only the relevant fields, and then PATCH. The following example only shows the update to the **numberMatchingRequiredState**.
132132

articles/active-directory/authentication/howto-sspr-windows.md

Lines changed: 22 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/17/2020
9+
ms.date: 03/18/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -66,7 +66,7 @@ To configure a Windows 10 device for SSPR at the sign-in screen, review the foll
6666
- Not unique to using SSPR from the Windows sign-in screen, all users must provide the authentication contact information before they can reset their password.
6767
- Network proxy requirements:
6868
- Port 443 to `passwordreset.microsoftonline.com` and `ajax.aspnetcdn.com`
69-
- Windows 10 devices only support machine-level proxy configuration.
69+
- Windows 10 devices require a machine-level proxy configuration or scoped proxy configuration for the temporary defaultuser1 account used to perform SSPR (see [Troubleshooting](#proxy-configurations-for-windows-password-reset) section for more details).
7070
- Run at least Windows 10, version April 2018 Update (v1803), and the devices must be either:
7171
- Azure AD joined
7272
- Hybrid Azure AD joined
@@ -112,7 +112,7 @@ To enable SSPR at the sign-in screen using a registry key, complete the followin
112112
"AllowPasswordReset"=dword:00000001
113113
```
114114
115-
#### Troubleshooting Windows 10 password reset
115+
### Troubleshooting Windows 10 password reset
116116
117117
If you have problems with using SSPR from the Windows sign-in screen, the Azure AD audit log includes information about the IP address and *ClientType* where the password reset occurred, as shown in the following example output:
118118
@@ -122,6 +122,25 @@ When users reset their password from the sign-in screen of a Windows 10 device,
122122
123123
The account itself has a randomly generated password, which is validated against an organizations password policy, doesn't show up for device sign-in, and is automatically removed after the user resets their password. Multiple `defaultuser` profiles may exist but can be safely ignored.
124124
125+
#### Proxy configurations for Windows password reset
126+
127+
During the password reset, SSPR creates a temporary local user account to connect to `https://passwordreset.microsoftonline.com/n/passwordreset`. When a proxy is configured for user authentication, it may fail with the error **"Something went wrong. Please, try again later."** This is because the local user account is not authorized to use the authenticated proxy.
128+
129+
In this case, you can use one of the following workarounds:
130+
131+
- Configure a machine-wide proxy setting that doesn't depend on the type of user logged into the machine. For example, you can enable the Group Policy **Make proxy settings per-machine (rather than per-user)** for the workstations.
132+
- You can also use Per-User proxy configuration for SSPR if you modify the registry template for the Default Account. The commands are as follows:
133+
134+
```cmd
135+
reg load "hku\Default" "C:\Users\Default\NTUSER.DAT"
136+
reg add "hku\Default\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyEnable /t REG_DWORD /d "1" /f
137+
reg add "hku\Default\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer /t REG_SZ /d "<your proxy:port>" /f
138+
reg unload "hku\Default"
139+
```
140+
141+
- The error **"Something went wrong"** can also occur when anything interrupts connectivity to URL `https://passwordreset.microsoftonline.com/n/passwordreset`. For example, this error can occur when antivirus software runs on the workstation without exclusions for URLs `passwordreset.microsoftonline.com`, `ajax.aspnetcdn.com`, and `ocsp.digicert.com`. Disable this software temporarily to test if the issue is resolved or not.
142+
143+
125144
## Windows 7, 8, and 8.1 password reset
126145
127146
To configure a Windows 7, 8, or 8.1 device for SSPR at the sign-in screen, review the following prerequisites and configuration steps.

articles/active-directory/develop/troubleshoot-publisher-verification.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,9 @@ One of these error messages are displayed: "A verified publisher can’t be adde
233233

234234
First, verify you've met the [publisher verification requirements](publisher-verification-overview.md#requirements).
235235

236+
> [!NOTE]
237+
> If you've met the publisher verification requirements and are still having issues, try using an existing or newly created user with similar permissions.
238+
236239
When a request to add a verified publisher is made, many signals are used to make a security risk assessment. If the request is determined to be risky an error will be returned. For security reasons, Microsoft doesn't disclose the specific criteria used to determine whether a request is risky or not. If you received this error and believe the "risky" assessment is incorrect, try waiting and resubmitting the verification request. Some customers have reported success after multiple attempts.
237240

238241
## Next steps

articles/active-directory/devices/hybrid-azuread-join-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ The following table provides details on support for these on-premises AD UPNs in
178178
| ----- | ----- | ----- | ----- |
179179
| Routable | Federated | From 1703 release | Generally available |
180180
| Non-routable | Federated | From 1803 release | Generally available |
181-
| Routable | Managed | From 1803 release | Generally available, Azure AD SSPR on Windows lock screen isn't supported. The on-premises UPN must be synced to the `onPremisesUserPrincipalName` attribute in Azure AD |
181+
| Routable | Managed | From 1803 release | Generally available, Azure AD SSPR on Windows lock screen isn't supported in environments where the on-premises UPN is different from the Azure AD UPN. The on-premises UPN must be synced to the `onPremisesUserPrincipalName` attribute in Azure AD |
182182
| Non-routable | Managed | Not supported | |
183183

184184
## Next steps

articles/active-directory/external-identities/authentication-conditional-access.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 02/07/2022
9+
ms.date: 03/21/2022
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -17,13 +17,13 @@ ms.collection: M365-identity-device-management
1717

1818
# Authentication and Conditional Access for External Identities
1919

20-
When an external user accesses resources in your organization, the authentication flow is determined by the user's identity provider (an external Azure AD tenant, social identity provider, etc.), Conditional Access policies, and the [cross-tenant access settings](cross-tenant-access-overview.md) configured both in the user's home tenant and the tenant hosting resources.
20+
When an external user accesses resources in your organization, the authentication flow is determined by the collaboration method (B2B collaboration or B2B direct connect), user's identity provider (an external Azure AD tenant, social identity provider, etc.), Conditional Access policies, and the [cross-tenant access settings](cross-tenant-access-overview.md) configured both in the user's home tenant and the tenant hosting resources.
2121

2222
This article describes the authentication flow for external users who are accessing resources in your organization. Organizations can enforce multiple Conditional Access policies for their external users, which can be enforced at the tenant, app, or individual user level in the same way that they're enabled for full-time employees and members of the organization.
2323

2424
## Authentication flow for external Azure AD users
2525

26-
The following diagram illustrates the authentication flow when an Azure AD organization shares resources with users from other Azure AD organizations. This diagram shows how cross-tenant access settings work with Conditional Access policies, such as multi-factor authentication (MFA), to determine if the user can access resources.
26+
The following diagram illustrates the authentication flow when an Azure AD organization shares resources with users from other Azure AD organizations. This diagram shows how cross-tenant access settings work with Conditional Access policies, such as multi-factor authentication (MFA), to determine if the user can access resources. This flow applies to both B2B collaboration and B2B direct connect, except as noted in step 6.
2727

2828
![Diagram illustrating the cross-tenant authentication process](media/authentication-conditional-access/cross-tenant-auth.png)
2929

@@ -34,7 +34,7 @@ The following diagram illustrates the authentication flow when an Azure AD organ
3434
|**3** | Azure AD checks Contoso’s inbound trust settings to see if Contoso trusts MFA and device claims (device compliance, hybrid Azure AD joined status) from Fabrikam. If not, skip to step 6. |
3535
|**4** | If Contoso trusts MFA and device claims from Fabrikam, Azure AD checks the user’s credentials for an indication the user has completed MFA. If Contoso trusts device information from Fabrikam, Azure AD uses the device ID to look up the device object in Fabrikam to determine its state (compliant or hybrid Azure AD joined). |
3636
|**5** | If MFA is required but not completed or if a device ID isn't provided, Azure AD issues MFA and device challenges in the user's home tenant as needed. When MFA and device requirements are satisfied in Fabrikam, the user is allowed access to the resource in Contoso. If the checks can’t be satisfied, access is blocked. |
37-
|**6** | When no trust settings are configured and MFA is required, B2B collaboration users are prompted for MFA, which they need to satisfy in the resource tenant. If device compliance is required, access is blocked. |
37+
|**6** | When no trust settings are configured and MFA is required, B2B collaboration users are prompted for MFA, which they need to satisfy in the resource tenant. Access is blocked for B2B direct connect users. If device compliance is required but can't be evaluated, access is blocked for both B2B collaboration and B2B direct connect users. |
3838

3939
For more information, see the [Conditional Access for external users](#conditional-access-for-external-users) section.
4040

@@ -70,7 +70,7 @@ The following diagram illustrates the flow when email one-time passcode authenti
7070

7171
## Conditional Access for external users
7272

73-
Organizations can enforce Conditional Access policies for external B2B collaboration users in the same way that they're enabled for full-time employees and members of the organization. This section describes important considerations for applying Conditional Access to users outside of your organization.
73+
Organizations can enforce Conditional Access policies for external B2B collaboration and B2B direct connect users in the same way that they're enabled for full-time employees and members of the organization. This section describes important considerations for applying Conditional Access to users outside of your organization.
7474

7575
### Azure AD cross-tenant trust settings for MFA and device claims
7676

0 commit comments

Comments
 (0)