Skip to content

Commit f05040f

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into vm-ipv6
2 parents bbdda7b + 2f82be4 commit f05040f

File tree

118 files changed

+1510
-755
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

118 files changed

+1510
-755
lines changed

.github/workflows/stale.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ jobs:
2020
exempt-pr-labels: keep-open
2121
operations-per-run: 1200
2222
ascending: true
23-
start-date: '2021-04-15'
23+
start-date: '2021-08-10'
2424
stale-pr-message: >
2525
This pull request has been inactive for at least 14 days.
2626
If you are finished with your changes, don't forget to sign off. See the [contributor guide](https://review.docs.microsoft.com/help/contribute/contribute-how-to-write-pull-request-automation) for instructions.

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26716,6 +26716,11 @@
2671626716
"redirect_url": "/azure/spatial-anchors/how-tos/create-locate-anchors-unity",
2671726717
"redirect_document_id": false
2671826718
},
26719+
{
26720+
"source_path_from_root": "/articles/spring-cloud/expose-apps-gateway-azure-firewall.md",
26721+
"redirect_url": "/azure/spring-cloud/expose-apps-gateway",
26722+
"redirect_document_id": false
26723+
},
2671926724
{
2672026725
"source_path_from_root": "/articles/spring-cloud/how-to-provision-azure-spring-cloud-instance-terraform.md",
2672126726
"redirect_url": "/azure/spring-cloud/quickstart-deploy-infrastructure-vnet-terraform",

articles/active-directory/conditional-access/block-legacy-authentication.md

Lines changed: 29 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -6,18 +6,21 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 01/26/2021
9+
ms.date: 11/12/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: karenhoran
14-
ms.reviewer: calebb, dawoo
14+
ms.reviewer: calebb, dawoo, jebeckha, grtaylor
1515

1616
ms.collection: M365-identity-device-management
1717
---
1818
# How to: Block legacy authentication to Azure AD with Conditional Access
1919

20-
To give your users easy access to your cloud apps, Azure Active Directory (Azure AD) supports a broad variety of authentication protocols including legacy authentication. However, legacy protocols don't support multi-factor authentication (MFA). MFA is in many environments a common requirement to address identity theft.
20+
To give your users easy access to your cloud apps, Azure Active Directory (Azure AD) supports a broad variety of authentication protocols including legacy authentication. However, legacy authentication does not support multifactor authentication (MFA). MFA is in many environments a common requirement to address identity theft.
21+
22+
> [!NOTE]
23+
> Effective October 1, 2022, we will begin to permanently disable Basic Authentication for Exchange Online in all Microsoft 365 tenants regardless of usage, except for SMTP Authentication.
2124
2225
Alex Weinert, Director of Identity Security at Microsoft, in his March 12, 2020 blog post [New tools to block legacy authentication in your organization](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/new-tools-to-block-legacy-authentication-in-your-organization/ba-p/1225302#) emphasizes why organizations should block legacy authentication and what other tools Microsoft provides to accomplish this task:
2326

@@ -30,7 +33,11 @@ Alex Weinert, Director of Identity Security at Microsoft, in his March 12, 2020
3033
> - Azure AD accounts in organizations that have disabled legacy authentication experience 67 percent fewer compromises than those where legacy authentication is enabled
3134
>
3235
33-
If your environment is ready to block legacy authentication to improve your tenant's protection, you can accomplish this goal with Conditional Access. This article explains how you can configure Conditional Access policies that block legacy authentication for your tenant. Customers without licenses that include Conditional Access can make use of [security defaults](../fundamentals/concept-fundamentals-security-defaults.md)) to block legacy authentication.
36+
If your environment is ready to block legacy authentication to improve your tenant's protection, you can accomplish this goal with Conditional Access. This article explains how you can configure Conditional Access policies that block legacy authentication for all workloads within your tenant.
37+
38+
While rolling out legacy authentication blocking protection, we recommend a phased approach, rather than disabling it for all users all at once. Customers may choose to first begin disabling basic authentication on a per-protocol basis, by leveraging Exchange Online authentication policies, then (optionally) also blocking legacy authentication via Conditional Access policies when ready.
39+
40+
Customers without licenses that include Conditional Access can make use of [security defaults](../fundamentals/concept-fundamentals-security-defaults.md) to block legacy authentication.
3441

3542
## Prerequisites
3643

@@ -41,12 +48,14 @@ This article assumes that you are familiar with the [basic concepts](overview.md
4148
4249
## Scenario description
4350

44-
Azure AD supports several of the most widely used authentication and authorization protocols including legacy authentication. Legacy authentication refers to protocols that use basic authentication. Typically, these protocols can't enforce any type of second factor authentication. Examples for apps that are based on legacy authentication are:
51+
Azure AD supports several of the most widely used authentication and authorization protocols including legacy authentication. Legacy authentication refers to basic authentication, a widely used industry-standard method for collecting user name and password information. Typically, legacy authentication clients can't enforce any type of second factor authentication. Examples of applications that commonly or only use legacy authentication are:
4552

46-
- Older Microsoft Office apps
47-
- Apps using mail protocols like POP, IMAP, and SMTP
53+
- Microsoft Office 2013 or older.
54+
- Apps using mail protocols like POP, IMAP, and SMTP AUTH.
4855

49-
Single factor authentication (for example, username and password) is not enough these days. Passwords are bad as they are easy to guess and we (humans) are bad at choosing good passwords. Passwords are also vulnerable to various attacks, like phishing and password spray. One of the easiest things you can do to protect against password threats is to implement multi-factor authentication (MFA). With MFA, even if an attacker gets in possession of a user's password, the password alone is not sufficient to successfully authenticate and access the data.
56+
For more information about modern authentication support in Office, see [How modern authentication works for Office client apps](/microsoft-365/enterprise/modern-auth-for-office-2013-and-2016?view=o365-worldwide).
57+
58+
Single factor authentication (for example, username and password) is not enough these days. Passwords are bad as they are easy to guess and we (humans) are bad at choosing good passwords. Passwords are also vulnerable to various attacks, like phishing and password spray. One of the easiest things you can do to protect against password threats is to implement multifactor authentication (MFA). With MFA, even if an attacker gets in possession of a user's password, the password alone is not sufficient to successfully authenticate and access the data.
5059

5160
How can you prevent apps using legacy authentication from accessing your tenant's resources? The recommendation is to just block them with a Conditional Access policy. If necessary, you allow only certain users and specific network locations to use apps that are based on legacy authentication.
5261

@@ -56,22 +65,22 @@ Conditional Access policies are enforced after the first-factor authentication h
5665

5766
This section explains how to configure a Conditional Access policy to block legacy authentication.
5867

59-
### Legacy authentication protocols
68+
### Messaging protocols that support legacy authentication
6069

61-
The following options are considered legacy authentication protocols
70+
The following messaging protocols support legacy authentication:
6271

63-
- Authenticated SMTP - Used by POP and IMAP clients to send email messages.
72+
- Authenticated SMTP - Used to send authenticated email messages.
6473
- Autodiscover - Used by Outlook and EAS clients to find and connect to mailboxes in Exchange Online.
6574
- Exchange ActiveSync (EAS) - Used to connect to mailboxes in Exchange Online.
66-
- Exchange Online PowerShell - Used to connect to Exchange Online with remote PowerShell. If you block Basic authentication for Exchange Online PowerShell, you need to use the Exchange Online PowerShell Module to connect. For instructions, see [Connect to Exchange Online PowerShell using multi-factor authentication](/powershell/exchange/exchange-online/connect-to-exchange-online-powershell/mfa-connect-to-exchange-online-powershell).
75+
- Exchange Online PowerShell - Used to connect to Exchange Online with remote PowerShell. If you block Basic authentication for Exchange Online PowerShell, you need to use the Exchange Online PowerShell Module to connect. For instructions, see [Connect to Exchange Online PowerShell using multifactor authentication](/powershell/exchange/exchange-online/connect-to-exchange-online-powershell/mfa-connect-to-exchange-online-powershell).
6776
- Exchange Web Services (EWS) - A programming interface that's used by Outlook, Outlook for Mac, and third-party apps.
6877
- IMAP4 - Used by IMAP email clients.
69-
- MAPI over HTTP (MAPI/HTTP) - Used by Outlook 2010 and later.
78+
- MAPI over HTTP (MAPI/HTTP) - Primary mailbox access protocol used by Outlook 2010 SP2 and later.
7079
- Offline Address Book (OAB) - A copy of address list collections that are downloaded and used by Outlook.
71-
- Outlook Anywhere (RPC over HTTP) - Used by Outlook 2016 and earlier.
72-
- Outlook Service - Used by the Mail and Calendar app for Windows 10.
80+
- Outlook Anywhere (RPC over HTTP) - Legacy mailbox access protocol supported by all current Outlook versions.
7381
- POP3 - Used by POP email clients.
7482
- Reporting Web Services - Used to retrieve report data in Exchange Online.
83+
- Universal Outlook - Used by the Mail and Calendar app for Windows 10.
7584
- Other clients - Other protocols identified as utilizing legacy authentication.
7685

7786
For more information about these authentication protocols and services, see [Sign-in activity reports in the Azure Active Directory portal](../reports-monitoring/concept-sign-ins.md#filter-sign-in-activities).
@@ -98,24 +107,24 @@ There are two ways to use Conditional Access policies to block legacy authentica
98107

99108
### Directly blocking legacy authentication
100109

101-
The easiest way to block legacy authentication across your entire organization is by configuring a Conditional Access policy that applies specifically to legacy authentication clients and blocks access. When assigning users and applications to the policy, make sure to exclude users and service accounts that still need to sign in using legacy authentication. Configure the client apps condition by selecting **Exchange ActiveSync clients** and **Other clients**. To block access for these client apps, configure the access controls to Block access.
110+
The easiest way to block legacy authentication across your entire organization is by configuring a Conditional Access policy that applies specifically to legacy authentication clients and blocks access. When assigning users and applications to the policy, make sure to exclude users and service accounts that still need to sign in using legacy authentication. When choosing the cloud apps in which to apply this policy, select All cloud apps, targeted apps such as Office 365 (recommended) or at a minimum, Office 365 Exchange Online. Configure the client apps condition by selecting **Exchange ActiveSync clients** and **Other clients**. To block access for these client apps, configure the access controls to Block access.
102111

103112
![Client apps condition configured to block legacy auth](./media/block-legacy-authentication/client-apps-condition-configured-yes.png)
104113

105114
### Indirectly blocking legacy authentication
106115

107-
Even if your organization isn’t ready to block legacy authentication across the entire organization, you should ensure that sign-ins using legacy authentication aren’t bypassing policies that require grant controls such as requiring multi-factor authentication or compliant/hybrid Azure AD joined devices. During authentication, legacy authentication clients do not support sending MFA, device compliance, or join state information to Azure AD. Therefore, apply policies with grant controls to all client applications so that legacy authentication based sign-ins that cannot satisfy the grant controls are blocked. With the general availability of the client apps condition in August 2020, newly created Conditional Access policies apply to all client apps by default.
116+
Even if your organization isn’t ready to block legacy authentication across the entire organization, you should ensure that sign-ins using legacy authentication aren’t bypassing policies that require grant controls such as requiring multifactor authentication or compliant/hybrid Azure AD joined devices. During authentication, legacy authentication clients do not support sending MFA, device compliance, or join state information to Azure AD. Therefore, apply policies with grant controls to all client applications so that legacy authentication based sign-ins that cannot satisfy the grant controls are blocked. With the general availability of the client apps condition in August 2020, newly created Conditional Access policies apply to all client apps by default.
108117

109118
![Client apps condition default configuration](./media/block-legacy-authentication/client-apps-condition-configured-no.png)
110119

111120
## What you should know
112121

122+
It can take up to 24 hours for the Conditional Access policy to go into effect.
123+
113124
Blocking access using **Other clients** also blocks Exchange Online PowerShell and Dynamics 365 using basic auth.
114125

115126
Configuring a policy for **Other clients** blocks the entire organization from certain clients like SPConnect. This block happens because older clients authenticate in unexpected ways. The issue doesn't apply to major Office applications like the older Office clients.
116127

117-
It can take up to 24 hours for the policy to go into effect.
118-
119128
You can select all available grant controls for the **Other clients** condition; however, the end-user experience is always the same - blocked access.
120129

121130
### SharePoint Online and B2B guest users
@@ -126,5 +135,5 @@ To block B2B user access via legacy authentication to SharePoint Online, organiz
126135

127136
- [Determine impact using Conditional Access report-only mode](howto-conditional-access-insights-reporting.md)
128137
- If you are not familiar with configuring Conditional Access policies yet, see [require MFA for specific apps with Azure Active Directory Conditional Access](../authentication/tutorial-enable-azure-mfa.md) for an example.
129-
- For more information about modern authentication support, see [How modern authentication works for Office 2013 and Office 2016 client apps](/office365/enterprise/modern-auth-for-office-2013-and-2016)
138+
- For more information about modern authentication support, see [How modern authentication works for Office client apps](/office365/enterprise/modern-auth-for-office-2013-and-2016)
130139
- [How to set up a multifunction device or application to send email using Microsoft 365](/exchange/mail-flow-best-practices/how-to-set-up-a-multifunction-device-or-application-to-send-email-using-microsoft-365-or-office-365)

articles/active-directory/develop/msal-net-token-cache-serialization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -738,8 +738,8 @@ MSAL exposes important metrics as part of [AuthenticationResult.AuthenticationRe
738738
| `DurationTotalInMs` | Total time spent in MSAL, including network calls and cache | Alarm on overall high latency (> 1 s). Value depends on token source. From the cache: one cache access. From AAD: two cache accesses + one HTTP call. First ever call (per-process) will take longer because of one extra HTTP call. |
739739
| `DurationInCacheInMs` | Time spent loading or saving the token cache, which is customized by the app developer (for example, save to Redis).| Alarm on spikes. |
740740
| `DurationInHttpInMs`| Time spent making HTTP calls to AAD. | Alarm on spikes.|
741-
| `TokenSource` | Indicates the source of the token. Tokens are retrieved from the cache much faster (for example, ~100 ms versus ~700 ms). Can be used to monitor and alarm the cache hit ratio. | Use with `DurationTotalInMs` |
742-
741+
| `TokenSource` | Indicates the source of the token. Tokens are retrieved from the cache much faster (for example, ~100 ms versus ~700 ms). Can be used to monitor and alarm the cache hit ratio. | Use with `DurationTotalInMs`. |
742+
| `CacheRefreshReason` | Specifies the reason for fetching the access token from the identity provider. | Use with `TokenSource`. |
743743

744744
## Next steps
745745

articles/active-directory/enterprise-users/groups-assign-sensitivity-labels.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ To apply published labels to groups, you must first enable the feature. These st
6969
1. Save the changes and apply the settings:
7070
7171
```powershell
72-
Set-AzureADDirectorySetting -Id grpUnifiedSetting.Id -DirectorySetting $setting
72+
Set-AzureADDirectorySetting -Id $grpUnifiedSetting.Id -DirectorySetting $setting
7373
```
7474
7575
You will also need to synchronize your sensitivity labels to Azure AD. For instructions, see [How to enable sensitivity labels for containers and synchronize labels](/microsoft-365/compliance/sensitivity-labels-teams-groups-sites#how-to-enable-sensitivity-labels-for-containers-and-synchronize-labels).

articles/active-directory/fundamentals/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ The following new capabilities have been added to the claims transformations ava
9595

9696
---
9797

98-
### Public preview - Flagged
98+
### Public Preview – Flagged Sign-ins
9999

100100
**Type:** New feature
101101
**Service category:** Reporting

articles/active-directory/hybrid/how-to-connect-fed-group-claims.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ Valid values are:
144144
| **"SecurityGroup"** | Emits security groups the user is a member of in the groups claim |
145145
| **"DirectoryRole"** | If the user is assigned directory roles, they are emitted as a 'wids' claim (groups claim won't be emitted) |
146146
| **"ApplicationGroup"** | Emits only the groups that are explicitly assigned to the application and the user is a member of |
147-
| **"None"** | No Groups are returned.(Its not case-sensetive so none works as well and it can be set directly in the application manifest.) |
147+
| **"None"** | No Groups are returned.(Its not case-sensitive so none works as well and it can be set directly in the application manifest.) |
148148

149149
For example:
150150

0 commit comments

Comments
 (0)