Skip to content

Commit f946797

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents eedeb24 + 9d3fd68 commit f946797

File tree

86 files changed

+1635
-1151
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

86 files changed

+1635
-1151
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25215,7 +25215,7 @@
2521525215
},
2521625216
{
2521725217
"source_path_from_root": "/articles/azure-sql/managed-instance/azure-app-sync-network-configuration.md",
25218-
"redirect_url": "/azure/azure-sql/managed-instance/index.yml",
25218+
"redirect_url": "/azure/azure-sql/managed-instance/",
2521925219
"redirect_document_id": false
2522025220
},
2522125221
{

articles/active-directory-b2c/partner-bindid.md

Lines changed: 172 additions & 175 deletions
Large diffs are not rendered by default.

articles/active-directory/authentication/concept-authentication-oath-tokens.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 07/26/2021
9+
ms.date: 03/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
@@ -48,7 +48,7 @@ [email protected],1234567,2234567abcdef2234567abcdef,60,Contoso,HardwareKey
4848
```
4949

5050
> [!NOTE]
51-
> Make sure you include the header row in your CSV file. If a UPN has a single quote, escape it with another single quote. For example, if the UPN is my’[email protected], change it to my’’[email protected] when uploading the file.
51+
> Make sure you include the header row in your CSV file.
5252
5353
Once properly formatted as a CSV file, a Global Administrator can then sign in to the Azure portal, navigate to **Azure Active Directory > Security > MFA > OATH tokens**, and upload the resulting CSV file.
5454

articles/active-directory/cloud-sync/how-to-prerequisites.md

Lines changed: 45 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -104,28 +104,10 @@ Run the [IdFix tool](/office365/enterprise/prepare-directory-attributes-for-sync
104104

105105
2. The PowerShell execution policy on the local server must be set to Undefined or RemoteSigned.
106106

107-
3. If there's a firewall between your servers and Azure AD, configure the following items:
108-
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
109-
110-
| Port number | How it's used |
111-
| --- | --- |
112-
| **80** | Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate. |
113-
| **443** | Handles all outbound communication with the service. |
114-
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed in the Azure AD portal. |
115-
116-
- If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
117-
- If your firewall or proxy allows you to specify safe suffixes, add connections to \*.msappproxy.net and \*.servicebus.windows.net. If not, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
118-
- If you are installing against the **US government** cloud, and your firewall or proxy allows you to specify safe suffixes, add connections to:
119-
- *.microsoftonline.us
120-
- *.microsoft.us
121-
- *.msappproxy.us
122-
- *.windowsazure.us
123-
124-
- Your agents need access to login.windows.net and login.microsoftonline.com for initial registration. Open your firewall for those URLs as well.
125-
- For certificate validation, unblock the following URLs: mscrl.microsoft.com:80, crl.microsoft.com:80, ocsp.msocsp.com:80, and www\.microsoft.com:80. These URLs are used for certificate validation with other Microsoft products, so you might already have these URLs unblocked.
126-
127-
>[!NOTE]
128-
> Installing the cloud provisioning agent on Windows Server Core is not supported.
107+
3. If there's a firewall between your servers and Azure AD, configure see [Firewall and proxy requirements](#firewall-and-proxy-requirements) below.
108+
109+
>[!NOTE]
110+
> Installing the cloud provisioning agent on Windows Server Core is not supported.
129111
130112
### Additional requirements
131113

@@ -150,6 +132,47 @@ To enable TLS 1.2, follow these steps.
150132
```
151133
152134
1. Restart the server.
135+
136+
## Firewall and Proxy requirements
137+
If there's a firewall between your servers and Azure AD, configure the following items:
138+
139+
- Ensure that agents can make *outbound* requests to Azure AD over the following ports:
140+
141+
| Port number | How it's used |
142+
| --- | --- |
143+
| **80** | Downloads the certificate revocation lists (CRLs) while validating the TLS/SSL certificate. |
144+
| **443** | Handles all outbound communication with the service. |
145+
| **8080** (optional) | Agents report their status every 10 minutes over port 8080, if port 443 is unavailable. This status is displayed in the Azure AD portal. |
146+
147+
- If your firewall enforces rules according to the originating users, open these ports for traffic from Windows services that run as a network service.
148+
- If your firewall or proxy allows you to specify safe suffixes, add connections:
149+
150+
#### [Public Cloud](#tab/public-cloud)
151+
152+
153+
|URL |How it's used|
154+
|-----|-----|
155+
|&#42;.msappproxy.net</br>&#42;.servicebus.windows.net|The agent uses these URLs to communicate with the Azure AD cloud service. |
156+
|&#42;.microsoftonline.com</br>&#42;.microsoft.com</br>&#42;.msappproxy.com</br>&#42;.windowsazure.com|The agent uses these URLs to communicate with the Azure AD cloud service. |
157+
|`mscrl.microsoft.com:80` </br>`crl.microsoft.com:80` </br>`ocsp.msocsp.com:80` </br>`www.microsoft.com:80`| The agent uses these URLs to verify certificates.|
158+
|login.windows.net</br>|The agent uses these URLs during the registration process.
159+
160+
161+
162+
#### [U.S. Government Cloud](#tab/us-government-cloud)
163+
164+
|URL |How it's used|
165+
|-----|-----|
166+
|&#42;.msappproxy.us</br>&#42;.servicebus.usgovcloudapi.net|The agent uses these URLs to communicate with the Azure AD cloud service. |
167+
|`mscrl.microsoft.us:80` </br>`crl.microsoft.us:80` </br>`ocsp.msocsp.us:80` </br>`www.microsoft.us:80`| The agent uses these URLs to verify certificates.|
168+
|login.windows.us </br>secure.aadcdn.microsoftonline-p.com </br>&#42;.microsoftonline.us </br>&#42;.microsoftonline-p.us </br>&#42;.msauth.net </br>&#42;.msauthimages.net </br>&#42;.msecnd.net</br>&#42;.msftauth.net </br>&#42;.msftauthimages.net</br>&#42;.phonefactor.net </br>enterpriseregistration.windows.net</br>management.azure.com </br>policykeyservice.dc.ad.msft.net</br>ctldl.windowsupdate.us:80| The agent uses these URLs during the registration process.
169+
170+
171+
172+
173+
- If you are unable to add connections, allow access to the [Azure datacenter IP ranges](https://www.microsoft.com/download/details.aspx?id=41653), which are updated weekly.
174+
175+
---
153176
## NTLM requirement
154177
155178
You should not enable NTLM on the Windows Server that is running the Azure AD Connect Provisioning Agent and if it is enabled you should make sure you disable it.

articles/active-directory/develop/v2-oauth2-on-behalf-of-flow.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,16 @@ The OBO flow only works for user principals at this time. A service principal ca
2424

2525
This article describes how to program directly against the protocol in your application. When possible, we recommend you use the supported Microsoft Authentication Libraries (MSAL) instead to [acquire tokens and call secured web APIs](authentication-flows-app-scenarios.md#scenarios-and-supported-authentication-flows). Also take a look at the [sample apps that use MSAL](sample-v2-code.md).
2626

27-
As of May 2018, some implicit-flow derived `id_token` can't be used for OBO flow. Single-page apps (SPAs) should pass an **access** token to a middle-tier confidential client to perform OBO flows instead. For more info about which clients can perform OBO calls, see [limitations](#client-limitations).
28-
2927
[!INCLUDE [try-in-postman-link](includes/try-in-postman-link.md)]
3028

29+
## Client limitations
30+
31+
As of May 2018, some implicit-flow derived `id_token` can't be used for OBO flow. Single-page apps (SPAs) should pass an **access** token to a middle-tier confidential client to perform OBO flows instead.
32+
33+
If a client uses the implicit flow to get an id_token, and that client also has wildcards in a reply URL, the id_token can't be used for an OBO flow. However, access tokens acquired through the implicit grant flow can still be redeemed by a confidential client even if the initiating client has a wildcard reply URL registered.
34+
35+
Additionally, applications with custom signing keys cannot be used as middle-tier API's in the OBO flow (this includes enterprise applications configured for single sign-on). This will result in an error because tokens signed with a key controlled by the client cannot be safely accepted.
36+
3137
## Protocol diagram
3238

3339
Assume that the user has been authenticated on an application using the [OAuth 2.0 authorization code grant flow](v2-oauth2-auth-code-flow.md) or another login flow. At this point, the application has an access token *for API A* (token A) with the user's claims and consent to access the middle-tier web API (API A). Now, API A needs to make an authenticated request to the downstream web API (API B).
@@ -262,10 +268,6 @@ A tenant admin can guarantee that applications have permission to call their req
262268

263269
In some scenarios, you may only have a single pairing of middle-tier and front-end client. In this scenario, you may find it easier to make this a single application, negating the need for a middle-tier application altogether. To authenticate between the front-end and the web API, you can use cookies, an id_token, or an access token requested for the application itself. Then, request consent from this single application to the back-end resource.
264270

265-
## Client limitations
266-
267-
If a client uses the implicit flow to get an id_token, and that client also has wildcards in a reply URL, the id_token can't be used for an OBO flow. However, access tokens acquired through the implicit grant flow can still be redeemed by a confidential client even if the initiating client has a wildcard reply URL registered.
268-
269271
## Next steps
270272

271273
Learn more about the OAuth 2.0 protocol and another way to perform service to service auth using client credentials.

articles/active-directory/hybrid/reference-connect-government-cloud.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,13 @@ The following information describes implementation of Pass-through Authenticatio
3030

3131
Before you deploy the Pass-through Authentication agent, verify whether a firewall exists between your servers and Azure AD. If your firewall or proxy allows Domain Name System (DNS) blocked or safe programs, add the following connections.
3232

33-
> [!NOTE]
34-
> The following guidance also applies to installing the [Azure AD Application Proxy connector](../app-proxy/what-is-application-proxy.md) for Azure Government environments.
33+
> [!IMPORTANT]
34+
> The following guidance applies only to the following:
35+
> - the pass-through authentication agent
36+
> - [Azure AD Application Proxy connector](../app-proxy/what-is-application-proxy.md)
37+
>
38+
> For information on URLS for the Azure Active Directory Connect Provisioning Agent see the [installation pre-requisites](../cloud-sync/how-to-prerequisites.md) for cloud sync.
39+
3540

3641
|URL |How it's used|
3742
|-----|-----|
5.96 KB
Loading

articles/active-directory/reports-monitoring/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,8 @@
130130
href: workbook-conditional-access-gap-analyzer.md
131131
- name: Cross-tenant access activity
132132
href: workbook-cross-tenant-access-activity.md
133+
- name: Sign-ins using legacy authentication
134+
href: workbook-legacy authentication.md
133135
- name: Risk analysis
134136
href: workbook-risk-analysis.md
135137
- name: Sensitive Operations Report
Lines changed: 109 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,109 @@
1+
---
2+
3+
title: Sign-ins using legacy authentication workbook in Azure AD | Microsoft Docs
4+
description: Learn how to use the sign-ins using legacy authentication workbook.
5+
services: active-directory
6+
documentationcenter: ''
7+
author: MarkusVi
8+
manager: karenho
9+
editor: ''
10+
11+
ms.service: active-directory
12+
ms.topic: reference
13+
ms.workload: identity
14+
ms.subservice: report-monitor
15+
ms.date: 03/16/2022
16+
ms.author: markvi
17+
ms.reviewer: besiler
18+
19+
ms.collection: M365-identity-device-management
20+
---
21+
22+
# Sign-ins using legacy authentication workbook
23+
24+
Have you ever wondered how you can determine whether it is safe to turn off legacy authentication in your tenant? The sign-ins using legacy authentication workbook helps you to answer this question.
25+
26+
This article gives you an overview of this workbook.
27+
28+
29+
## Description
30+
31+
![Workbook category](./media/workbook-risk-analysis/workbook-category.png)
32+
33+
Azure AD supports several of the most widely used authentication and authorization protocols including legacy authentication. Legacy authentication refers to basic authentication, which was once a widely used industry-standard method for passing user name and password information through a client to an identity provider.
34+
35+
Examples of applications that commonly or only use legacy authentication are:
36+
37+
- Microsoft Office 2013 or older.
38+
39+
- Apps using legacy auth with mail protocols like POP, IMAP, and SMTP AUTH.
40+
41+
42+
Single-factor authentication (for example, username and password) doesn’t provide the required level of protection for today’s computing environments. Passwords are bad as they are easy to guess and humans are bad at choosing good passwords.
43+
44+
45+
Unfortunately, legacy authentication:
46+
47+
- Does not support multi-factor authentication (MFA) or other strong authentication methods.
48+
49+
- Makes it impossible for your organization to move to passwordless authentication.
50+
51+
To improve the security of your Azure AD tenant and experience of your users, you should disable legacy authentication. However, important user experiences in your tenant might depend on legacy authentication. Before shutting off legacy authentication, you may want to find those cases so you can migrate them to more secure authentication.
52+
53+
The sign-ins using legacy authentication workbook lets you see all legacy authentication sign-ins in your environment so you can find and migrate critical workflows to more secure authentication methods before you shut off legacy authentication.
54+
55+
56+
57+
58+
## Sections
59+
60+
With this workbook, you can distinguish between interactive and non-interactive sign-ins. This workbook highlights which legacy authentication protocols are used throughout your tenant.
61+
62+
The data collection consists of three steps:
63+
64+
1. Select a legacy authentication protocol, and then select an application to filter by users accessing that application.
65+
66+
2. Select a user to see all their legacy authentication sign-ins to the selected app.
67+
68+
3. View all legacy authentication sign-ins for the user to understand how legacy authentication is being used.
69+
70+
71+
72+
73+
74+
75+
## Filters
76+
77+
78+
This workbook supports multiple filters:
79+
80+
81+
- Time range (up to 90 days)
82+
83+
- User principal name
84+
85+
- Application
86+
87+
- Status of the sign-in (success or failure)
88+
89+
90+
![Filter options](./media/workbook-legacy-authentication/filter-options.png)
91+
92+
93+
## Best practices
94+
95+
96+
- **[Enable risky sign-in policies](../identity-protection/concept-identity-protection-policies.md)** - To prompt for multi-factor authentication (MFA) on medium risk or above. Enabling the policy reduces the proportion of active real-time risk detections by allowing legitimate users to self-remediate the risk detections with MFA.
97+
98+
- **[Enable a risky user policy](../identity-protection/howto-identity-protection-configure-risk-policies.md#user-risk-with-conditional-access)** - To enable users to securely remediate their accounts when they are high risk. Enabling the policy reduces the number of active at-risk users in your organization by returning the user’s credentials to a safe state.
99+
100+
101+
102+
103+
104+
## Next steps
105+
106+
- To learn more about identity protection, see [What is identity protection](../identity-protection/overview-identity-protection.md).
107+
108+
- For more information about Azure AD workbooks, see [How to use Azure AD workbooks](howto-use-azure-monitor-workbooks.md).
109+

articles/aks/concepts-clusters-workloads.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You can build and run modern, portable, microservices-based applications, using
3030

3131
As an open platform, Kubernetes allows you to build your applications with your preferred programming language, OS, libraries, or messaging bus. Existing continuous integration and continuous delivery (CI/CD) tools can integrate with Kubernetes to schedule and deploy releases.
3232

33-
AKS provides a managed Kubernetes service that reduces the complexity of deployment and core management tasks, like upgrade coordination. The Azure platform manages the AKS control plane, and you only pay for the AKS nodes that run your applications. AKS is built on top of the open-source Azure Kubernetes Service Engine: [aks-engine][aks-engine].
33+
AKS provides a managed Kubernetes service that reduces the complexity of deployment and core management tasks, like upgrade coordination. The Azure platform manages the AKS control plane, and you only pay for the AKS nodes that run your applications.
3434

3535
## Kubernetes cluster architecture
3636

@@ -296,7 +296,6 @@ This article covers some of the core Kubernetes components and how they apply to
296296
- [Kubernetes / AKS scale][aks-concepts-scale]
297297

298298
<!-- EXTERNAL LINKS -->
299-
[aks-engine]: https://github.com/Azure/aks-engine
300299
[cluster-api-provider-azure]: https://github.com/kubernetes-sigs/cluster-api-provider-azure
301300
[kubernetes-pods]: https://kubernetes.io/docs/concepts/workloads/pods/pod-overview/
302301
[kubernetes-pod-lifecycle]: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/

0 commit comments

Comments
 (0)