Skip to content

Commit f5234c1

Browse files
committed
2 parents 3cf340d + e705fbc commit f5234c1

File tree

90 files changed

+1866
-838
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

90 files changed

+1866
-838
lines changed

articles/active-directory/authentication/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -302,6 +302,8 @@
302302
href: /answers/topics/azure-active-directory.html
303303
- name: Pricing
304304
href: https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing
305+
- name: Feature availability
306+
href: feature-availability.md
305307
- name: Service updates
306308
href: ../fundamentals/whats-new.md
307309
- name: Stack Overflow

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Let's cover each step:
4949

5050
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-alt.png" alt-text="Screenshot of the Sign-in if FIDO2 is also enabled.":::
5151

52-
1. After the user clicks the link, the client is redirected to the certauth endpoint, which is [https://certauth.login.microsoftonline.com](https://certauth.login.microsoftonline.com) for Azure Global. For [Azure Government](/azure-government/compare-azure-government-global-azure.md#guidance-for-developers), the certauth endpoint is [https://certauth.login.microsoftonline.us](https://certauth.login.microsoftonline.us). For the correct endpoint for other environments, see the specific Microsoft cloud docs.
52+
1. After the user clicks the link, the client is redirected to the certauth endpoint, which is [https://certauth.login.microsoftonline.com](https://certauth.login.microsoftonline.com) for Azure Global. For [Azure Government](/azure/azure-government/compare-azure-government-global-azure#guidance-for-developers), the certauth endpoint is [https://certauth.login.microsoftonline.us](https://certauth.login.microsoftonline.us). For the correct endpoint for other environments, see the specific Microsoft cloud docs.
5353

5454
The endpoint performs mutual authentication and requests the client certificate as part of the TLS handshake. You will see an entry for this request in the Sign-in logs. There is a [known issue](#known-issues) where User ID is displayed instead of Username.
5555

@@ -236,4 +236,3 @@ For the next test scenario, configure the authentication policy where the Issuer
236236
- [How to configure Azure AD CBA](how-to-certificate-based-authentication.md)
237237
- [FAQ](certificate-based-authentication-faq.yml)
238238
- [Troubleshoot Azure AD CBA](troubleshoot-certificate-based-authentication.md)
239-
Lines changed: 122 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,122 @@
1+
---
2+
title: Azure AD feature availability in Azure Government
3+
description: Learn which Azure AD features are available in Azure Government.
4+
5+
services: multi-factor-authentication
6+
ms.service: active-directory
7+
ms.subservice: authentication
8+
ms.topic: conceptual
9+
ms.date: 02/28/2022
10+
11+
ms.author: justinha
12+
author: justinha
13+
manager: daveba
14+
ms.reviewer: michmcla
15+
ms.collection: M365-identity-device-management
16+
---
17+
18+
# Cloud feature availability
19+
20+
<!---Jeremy said there are additional features that don't fit nicely in this list that we need to add later--->
21+
22+
This following table lists Azure AD feature availability in Azure Government.
23+
24+
25+
|Service | Feature | Availability |
26+
|:------|---------|:------------:|
27+
|**Authentication, single sign-on, and MFA**|||
28+
||Cloud authentication (Pass-through authentication, password hash synchronization) | &#x2705; |
29+
|| Federated authentication (Active Directory Federation Services or federation with other identity providers) | &#x2705; |
30+
|| Single sign-on (SSO) unlimited | &#x2705; |
31+
|| Multifactor authentication (MFA) | Hardware OATH tokens are not available. Instead, use Conditional Access policies with named locations to establish when multifactor authentication should and should not be required based off the user's current IP address. Microsoft Authenticator only shows GUID and not UPN for compliance reasons. |
32+
|| Passwordless (Windows Hello for Business, Microsoft Authenticator, FIDO2 security key integrations) | &#x2705; |
33+
|| Service-level agreement | &#x2705; |
34+
|**Applications access**|||
35+
|| SaaS apps with modern authentication (Azure AD application gallery apps, SAML, and OAUTH 2.0) | &#x2705; |
36+
|| Group assignment to applications | &#x2705; |
37+
|| Cloud app discovery (Microsoft Cloud App Security) | &#x2705; |
38+
|| Application Proxy for on-premises, header-based, and Integrated Windows Authentication | &#x2705; |
39+
|| Secure hybrid access partnerships (Kerberos, NTLM, LDAP, RDP, and SSH authentication) | &#x2705; |
40+
|**Authorization and Conditional Access**|||
41+
|| Role-based access control (RBAC) | &#x2705; |
42+
|| Conditional Access | &#x2705; |
43+
|| SharePoint limited access | &#x2705; |
44+
|| Session lifetime management | &#x2705; |
45+
|| Identity Protection (vulnerabilities and risky accounts) | See [Identity protection](#identity-protection) below. |
46+
|| Identity Protection (risk events investigation, SIEM connectivity) | See [Identity protection](#identity-protection) below. |
47+
|**Administration and hybrid identity**|||
48+
|| User and group management | &#x2705; |
49+
|| Advanced group management (Dynamic groups, naming policies, expiration, default classification) | &#x2705; |
50+
|| Directory synchronization—Azure AD Connect (sync and cloud sync) | &#x2705; |
51+
|| Azure AD Connect Health reporting | &#x2705; |
52+
|| Delegated administration—built-in roles | &#x2705; |
53+
|| Global password protection and management – cloud-only users | &#x2705; |
54+
|| Global password protection and management – custom banned passwords, users synchronized from on-premises Active Directory | &#x2705; |
55+
|| Microsoft Identity Manager user client access license (CAL) | &#x2705; |
56+
|**End-user self-service**|||
57+
|| Application launch portal (My Apps) | &#x2705; |
58+
|| User application collections in My Apps | &#x2705; |
59+
|| Self-service account management portal (My Account) | &#x2705; |
60+
|| Self-service password change for cloud users | &#x2705; |
61+
|| Self-service password reset/change/unlock with on-premises write-back | &#x2705; |
62+
|| Self-service sign-in activity search and reporting | &#x2705; |
63+
|| Self-service group management (My Groups) | &#x2705; |
64+
|| Self-service entitlement management (My Access) | &#x2705; |
65+
|**Identity governance**|||
66+
|| Automated user provisioning to apps | &#x2705; |
67+
|| Automated group provisioning to apps | &#x2705; |
68+
|| HR-driven provisioning | Partial. See [HR-provisioning apps](#hr-provisioning-apps). |
69+
|| Terms of use attestation | &#x2705; |
70+
|| Access certifications and reviews | &#x2705; |
71+
|| Entitlement management | &#x2705; |
72+
|| Privileged Identity Management (PIM), just-in-time access | &#x2705; |
73+
|**Event logging and reporting**|||
74+
|| Basic security and usage reports | &#x2705; |
75+
|| Advanced security and usage reports | &#x2705; |
76+
|| Identity Protection: vulnerabilities and risky accounts | &#x2705; |
77+
|| Identity Protection: risk events investigation, SIEM connectivity | &#x2705; |
78+
|**Frontline workers**|||
79+
|| SMS sign-in | Feature not available. |
80+
|| Shared device sign-out | Enterprise state roaming for Windows 10 devices is not available. |
81+
|| Delegated user management portal (My Staff) | Feature not available. |
82+
83+
84+
## Identity protection
85+
86+
| Risk Detection | Availability |
87+
|----------------|:--------------------:|
88+
|Leaked credentials (MACE) | &#x2705; |
89+
|Azure AD threat intelligence | Feature not available. |
90+
|Anonymous IP address | &#x2705; |
91+
|Atypical travel | &#x2705; |
92+
|Anomalous Token | Feature not available. |
93+
|Token Issuer Anomaly| Feature not available. |
94+
|Malware linked IP address | &#x2705; |
95+
|Suspicious browser | &#x2705; |
96+
|Unfamiliar sign-in properties | &#x2705; |
97+
|Admin confirmed user compromised | &#x2705; |
98+
|Malicious IP address | &#x2705; |
99+
|Suspicious inbox manipulation rules | &#x2705; |
100+
|Password spray | &#x2705; |
101+
|Impossible travel | &#x2705; |
102+
|New country | &#x2705; |
103+
|Activity from anonymous IP address | &#x2705; |
104+
|Suspicious inbox forwarding | &#x2705; |
105+
|Azure AD threat intelligence | Feature not available. |
106+
|Additional risk detected | &#x2705; |
107+
108+
109+
## HR-provisioning apps
110+
111+
| HR-provisioning app | Availability |
112+
|----------------|:--------------------:|
113+
|Workday to Azure AD User Provisioning | &#x2705; |
114+
|Workday Writeback | &#x2705; |
115+
|SuccessFactors to Azure AD User Provisioning | &#x2705; |
116+
|SuccessFactors to Writeback | &#x2705; |
117+
|Provisioning agent configuration and registration with Gov cloud tenant| Works with special undocumented command-line invocation:<br> AADConnectProvisioningAgent.Installer.exe ENVIRONMENTNAME=AzureUSGovernment |
118+
119+
120+
121+
122+

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Enable passwordless security key sign-in to on-premises resources by using Azure AD
1919

20-
This document discusses how to enable passwordless authentication to on-premises resources for environments with both *Azure Active Directory (Azure AD)-joined* and *hybrid Azure AD-joined* Windows 10 devices. This passwordless authentication functionality provides seamless single sign-on (SSO) to on-premises resources when you use Microsoft-compatible security keys, or with [Windows Hello for Business Cloud trust](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-trust.md)
20+
This document discusses how to enable passwordless authentication to on-premises resources for environments with both *Azure Active Directory (Azure AD)-joined* and *hybrid Azure AD-joined* Windows 10 devices. This passwordless authentication functionality provides seamless single sign-on (SSO) to on-premises resources when you use Microsoft-compatible security keys, or with [Windows Hello for Business Cloud trust](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-trust)
2121

2222
## Use SSO to sign in to on-premises resources by using FIDO2 keys
2323

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-howto-view-role-policy.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ The **Remediation** dashboard in CloudKnox Permissions Management (CloudKnox) en
3232
1. On the CloudKnox home page, select the **Remediation** tab, and then select the **Role/Policies** subtab.
3333

3434
The **Role/Policies list** displays a list of existing roles/policies and the following information about each role/policy
35-
- **Role/Policy name**: The name of the roles/policies available to you.
36-
- **Role/Policy type**: **Custom**, **System**, or **CloudKnox only**
35+
- **Role/Policy Name**: The name of the roles/policies available to you.
36+
- **Role/Policy Type**: **Custom**, **System**, or **CloudKnox Only**
3737
- **Actions**: The type of action you can perform on the role/policy, **Clone**, **Modify**, or **Delete**
3838

3939

@@ -42,24 +42,24 @@ The **Remediation** dashboard in CloudKnox Permissions Management (CloudKnox) en
4242
The **Tasks** list appears, displaying:
4343
- A list of **Tasks**.
4444
- **For AWS:**
45-
- The **Users**, **Groups**, and **Roles** the task is **Directly assigned to**.
46-
- The **Group members** and **Role identities** the task is **Indirectly assessable by**.
45+
- The **Users**, **Groups**, and **Roles** the task is **Directly Assigned To**.
46+
- The **Group Members** and **Role Identities** the task is **Indirectly Accessible By**.
4747

4848
- **For Azure:**
49-
- The **Users**, **Groups**, **Enterprise applications** and **Managed identities** the task is **Directly assigned to**.
50-
- The **Group members** the task is **Indirectly assessable by**.
49+
- The **Users**, **Groups**, **Enterprise Applications** and **Managed Identities** the task is **Directly Assigned To**.
50+
- The **Group Members** the task is **Indirectly Accessible By**.
5151

5252
- **For GCP:**
53-
- The **Users**, **Groups**, and **Service accounts** the task is **Directly assigned to**.
54-
- The **Group members** the task is **Indirectly assessable by**.
53+
- The **Users**, **Groups**, and **Service Accounts** the task is **Directly Assigned To**.
54+
- The **Group Members** the task is **Indirectly Accessible By**.
5555

5656
1. To close the role/policy details, select the arrow to the left of the role/policy name.
5757

5858
## Export information about roles/policies
5959

6060
- **Export CSV**: Select this option to export the displayed list of roles/policies as a comma-separated values (CSV) file.
6161

62-
When the file is successfully exported, a message appears: **Exported successfully.**
62+
When the file is successfully exported, a message appears: **Exported Successfully.**
6363

6464
- Check your email for a message from the CloudKnox Customer Success Team. This email contains a link to:
6565
- The **Role Policy Details** report in CSV format.
@@ -73,20 +73,20 @@ The **Remediation** dashboard in CloudKnox Permissions Management (CloudKnox) en
7373
1. On the CloudKnox home page, select the **Remediation** dashboard, and then select the **Role/Policies** tab.
7474
1. To filter the roles/policies, select from the following options:
7575

76-
- **Authorization system type**: Select **AWS**, **Azure**, or **GCP**.
77-
- **Authorization system**: Select the accounts you want.
78-
- **Role/Policy type**: Select from the following options:
76+
- **Authorization System Type**: Select **AWS**, **Azure**, or **GCP**.
77+
- **Authorization System**: Select the accounts you want.
78+
- **Role/Policy Type**: Select from the following options:
7979

8080
- **All**: All managed roles/policies.
8181
- **Custom**: A customer-managed role/policy.
8282
- **System**: A cloud service provider-managed role/policy.
83-
- **CloudKnox only**: A role/policy created by CloudKnox.
83+
- **CloudKnox Only**: A role/policy created by CloudKnox.
8484

85-
- **Role/Policy status**: Select **All**, **Assigned**, or **Unassigned**.
86-
- **Role/Policy usage**: Select **All** or **Unused**.
85+
- **Role/Policy Status**: Select **All**, **Assigned**, or **Unassigned**.
86+
- **Role/Policy Usage**: Select **All** or **Unused**.
8787
1. Select **Apply**.
8888

89-
To discard your changes, select **Reset filter**.
89+
To discard your changes, select **Reset Filter**.
9090

9191

9292
## Next steps

articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-product-data-sources.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ You can use the **Data Collectors** dashboard in CloudKnox Permissions Managemen
7676
1. Select the ellipses **(...)** at the end of the row in the table.
7777
1. Select **Delete Configuration**.
7878

79-
The **M-CIEM Onboarding - Summary** box displays.
79+
The **CloudKnox Onboarding - Summary** box displays.
8080
1. Select **Delete**.
8181
1. Check your email for a one time password (OTP) code, and enter it in **Enter OTP**.
8282

0 commit comments

Comments
 (0)