Skip to content

Commit fb79b91

Browse files
authored
Merge pull request #251432 from MicrosoftDocs/main
Merge main to live, 4 AM
2 parents c7d676d + 210be63 commit fb79b91

File tree

147 files changed

+1468
-619
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

147 files changed

+1468
-619
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8767,6 +8767,11 @@
87678767
"redirect_url": "/azure/developer/mobile-apps/azure-maps",
87688768
"redirect_document_id": false
87698769
},
8770+
{
8771+
"source_path_from_root": "/articles/azure-maps/choose-pricing-tier.md",
8772+
"redirect_url": "/azure/azure-maps/how-to-manage-pricing-tier",
8773+
"redirect_document_id": true
8774+
},
87708775
{
87718776
"source_path_from_root": "/articles/azure-maps/how-to-request-real-time-data.md",
87728777
"redirect_url": "/azure/azure-maps",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/managed-grafana/how-to-sync-teams-with-aad-groups.md",
5+
"redirect_url": "/azure/managed-grafana/how-to-sync-teams-with-azure-ad-groups",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

articles/active-directory/authentication/how-to-authentication-find-coverage-gaps.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,3 +58,7 @@ After your admins are enforced for multifactor authentication and have been usin
5858
- [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-overview)
5959

6060
You can read more about these authentication methods and their security considerations in [Azure AD authentication methods](concept-authentication-methods.md).
61+
62+
## Next steps
63+
64+
[Enable passwordless sign-in with Microsoft Authenticator](howto-authentication-passwordless-phone.md)

articles/active-directory/authentication/how-to-authentication-methods-manage.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 03/22/2023
9+
ms.date: 09/13/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -70,7 +70,10 @@ Record which users are in scope for SSPR (either all users, one specific group,
7070

7171
### Authentication methods policy
7272

73-
To check settings in the Authentication methods policy, sign in as an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator) and go to **Azure Active Directory** > **Security** > **Authentication methods** > **Policies**. A new tenant has all methods **Off** by default, which makes migration easier because legacy policy settings don't need to be merged with existing settings.
73+
To check settings in the Authentication methods policy, sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator) and browse to **Protection** > **Authentication methods** > **Policies**. A new tenant has all methods **Off** by default, which makes migration easier because legacy policy settings don't need to be merged with existing settings.
74+
75+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
76+
1. Browse to **Protection** > **Authentication methods** >
7477

7578
:::image type="content" source="media/concept-authentication-methods-manage/authentication-methods-policy.png" alt-text="Screenshot that shows the authentication methods." lightbox="media/concept-authentication-methods-manage/authentication-methods-policy.png":::
7679

articles/active-directory/authentication/how-to-authentication-sms-supported-apps.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
2525
| Microsoft One Note || |
2626
| Microsoft Teams |||
2727
| Company portal |||
28-
| My Apps Portal ||Not available|
28+
| My Apps portal ||Not available|
2929
| Microsoft Forms ||Not available|
3030
| Microsoft Edge || |
3131
| Microsoft Power BI || |
@@ -36,17 +36,17 @@ SMS-based authentication is available to Microsoft apps integrated with the Micr
3636

3737
*_SMS sign-in isn't available for office applications, such as Word, Excel, etc., when accessed directly on the web, but is available when accessed through the [Office 365 web app](https://www.office.com)_
3838

39-
The above mentioned Microsoft apps support SMS sign-in is because they use the Microsoft Identity login (`https://login.microsoftonline.com/`), which allows user to enter phone number and SMS code.
39+
The above mentioned Microsoft apps support SMS sign-in is because they use the Microsoft Identity login (`https://login.microsoftonline.com/`), which allows users to enter phone number and SMS code.
4040

4141
## Unsupported Microsoft apps
4242

4343
Microsoft 365 desktop (Windows or Mac) apps and Microsoft 365 web apps (except MS One Note) that are accessed directly on the web don't support SMS sign-in. These apps use the Microsoft Office login (`https://office.live.com/start/*`) that requires a password to sign in.
44-
For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Company Portal, and Microsoft Azure) don't support SMS sign-in.
44+
For the same reason, Microsoft Office mobile apps (except Microsoft Teams, Company portal, and Microsoft Azure) don't support SMS sign-in.
4545

4646
| Unsupported Microsoft apps| Examples |
4747
| --- | --- |
4848
| Native desktop Microsoft apps | Microsoft Teams, O365 apps, Word, Excel, etc.|
49-
| Native mobile Microsoft apps (except Microsoft Teams, Company Portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
49+
| Native mobile Microsoft apps (except Microsoft Teams, Company portal, and Microsoft Azure) | Outlook, Edge, Power BI, Stream, SharePoint, Power Apps, Word, etc.|
5050
| Microsoft 365 web apps (accessed directly on web) | [Outlook](https://outlook.live.com/owa/), [Word](https://office.live.com/start/Word.aspx), [Excel](https://office.live.com/start/Excel.aspx), [PowerPoint](https://office.live.com/start/PowerPoint.aspx)|
5151

5252
## Support for Non-Microsoft apps

articles/active-directory/authentication/how-to-certificate-based-authentication.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Topic that shows how to configure Azure AD certificate-based authen
55
ms.service: active-directory
66
ms.subservice: authentication
77
ms.topic: how-to
8-
ms.date: 02/09/2023
8+
ms.date: 09/13/2023
99

1010
ms.author: justinha
1111
author: justinha
@@ -53,16 +53,16 @@ Optionally, you can also configure authentication bindings to map certificates t
5353

5454
## Step 1: Configure the certification authorities
5555

56-
You can configure CAs by using the Azure portal or PowerShell.
56+
You can configure CAs by using the Microsoft Entra admin center or PowerShell.
5757

58-
### Configure certification authorities using the Azure portal
58+
### Configure certification authorities using the Microsoft Entra admin center
5959

6060
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
6161

62-
To enable the certificate-based authentication and configure user bindings in the Azure portal, complete the following steps:
62+
To enable the certificate-based authentication and configure user bindings in the Microsoft Entra admin center, complete the following steps:
6363

64-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
65-
1. Click **Azure Active Directory** > **Security**.
64+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
65+
1. Browse to **Protection** > **Authentication methods** > **Certifacte-based authentication**.
6666

6767
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/certificate-authorities.png" alt-text="Screenshot of certification authorities.":::
6868

@@ -144,11 +144,10 @@ For more information, see [Understanding the certificate revocation process](./c
144144
>[!IMPORTANT]
145145
>A user is considered capable for **MFA** when the user is in scope for **Certificate-based authentication** in the Authentication methods policy. This policy requirement means a user can't use proof up as part of their authentication to register other available methods. If the users do not have access to certificates they will be locked out and not be able to register other methods for MFA. So the admin needs to enable users who have a valid certificate into the CBA scope. Do not use all users for CBA target and use groups of users who have valid certificates available. For more information, see [Azure AD MFA](concept-mfa-howitworks.md).
146146
147-
To enable the certificate-based authentication in the Azure portal, complete the following steps:
147+
To enable the certificate-based authentication in the Microsoft Entra admin center, complete the following steps:
148148

149-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Authentication Policy Administrator.
150-
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
151-
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
149+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
150+
1. Browse to **Protection** > **Authentication methods** > **Certificate-based Authentication**.
152151
1. Under **Enable and Target**, click **Enable**.
153152
1. Click **All users**, or click **Add groups** to select specific groups.
154153

@@ -164,11 +163,10 @@ Once certificate-based authentication is enabled on the tenant, all users in the
164163

165164
The authentication binding policy helps determine the strength of authentication to either a single factor or multi factor. An admin can change the default value from single-factor to multifactor and configure custom policy rules by mapping to issuer Subject or policy OID fields in the certificate.
166165

167-
To enable Azure AD CBA and configure user bindings in the Azure portal, complete the following steps:
166+
To enable Azure AD CBA and configure user bindings in the Microsoft Entra admin center, complete the following steps:
168167

169-
1. Sign in to the [Azure portal](https://portal.azure.com) as an Authentication Policy Administrator.
170-
1. Select **Azure Active Directory**, then choose **Security** from the menu on the left-hand side.
171-
1. Click **Authentication methods** > **Policies**.
168+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
169+
1. Browse to **Protection** > **Authentication methods** > **Policies**.
172170
1. Under **Manage**, select **Authentication methods** > **Certificate-based Authentication**.
173171

174172
:::image type="content" border="true" source="./media/how-to-certificate-based-authentication/policy.png" alt-text="Screenshot of Authentication policy.":::

articles/active-directory/authentication/how-to-mfa-additional-context.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use additional context in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 01/29/2023
7+
ms.date: 09/13/2023
88
ms.author: justinha
99
author: mjsantani
1010
ms.collection: M365-identity-device-management
@@ -17,7 +17,7 @@ This topic covers how to improve the security of user sign-in by adding the appl
1717

1818
## Prerequisites
1919

20-
- Your organization needs to enable Microsoft Authenticator passwordless and push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Azure portal or Microsoft Graph API.
20+
- Your organization needs to enable Microsoft Authenticator passwordless and push notifications for some users or groups by using the new Authentication methods policy. You can edit the Authentication methods policy by using the Microsoft Entra admin center or Microsoft Graph API.
2121

2222
>[!NOTE]
2323
>The policy schema for Microsoft Graph APIs has been improved. The older policy schema is now deprecated. Make sure you use the new schema to help prevent errors.
@@ -165,7 +165,7 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
165165
#### Example of how to enable application name and geographic location for separate groups
166166

167167
In **featureSettings**, change **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** from **default** to **enabled.**
168-
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Azure portal.
168+
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Microsoft Entra admin center.
169169

170170
You need to PATCH the entire schema to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The following example shows an update to **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
171171

@@ -222,7 +222,7 @@ GET https://graph.microsoft.com/v1.0/authenticationMethodsPolicy/authenticationM
222222
#### Example of how to disable application name and only enable geographic location
223223

224224
In **featureSettings**, change the state of **displayAppInformationRequiredState** to **default** or **disabled** and **displayLocationInformationRequiredState** to **enabled.**
225-
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Azure portal.
225+
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Microsoft Entra admin center.
226226

227227
You need to PATCH the entire schema to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The following example shows an update to **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
228228

@@ -273,9 +273,9 @@ Only users who are enabled for Microsoft Authenticator under Microsoft Authentic
273273
#### Example of how to exclude a group from application name and geographic location
274274

275275
In **featureSettings**, change the states of **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** from **default** to **enabled.**
276-
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Azure portal.
276+
Inside the **includeTarget** for each featureSetting, change the **id** from **all_users** to the ObjectID of the group from the Microsoft Entra admin center.
277277

278-
In addition, for each of the features, you'll change the id of the excludeTarget to the ObjectID of the group from the Azure portal. This change excludes that group from seeing application name or geographic location.
278+
In addition, for each of the features, you'll change the id of the excludeTarget to the ObjectID of the group from the Microsoft Entra admin center. This change excludes that group from seeing application name or geographic location.
279279

280280
You need to PATCH the entire schema to prevent overwriting any previous configuration. We recommend that you do a GET first, and then update only the relevant fields and then PATCH. The following example shows an update to **displayAppInformationRequiredState** and **displayLocationInformationRequiredState** under **featureSettings**.
281281

@@ -408,11 +408,12 @@ To turn off additional context, you'll need to PATCH **displayAppInformationRequ
408408
}
409409
```
410410

411-
## Enable additional context in the portal
411+
## Enable additional context in the Microsoft Entra admin center
412412

413-
To enable application name or geographic location in the Azure portal, complete the following steps:
413+
To enable application name or geographic location in the Microsoft Entra admin center, complete the following steps:
414414

415-
1. In the Azure portal, click **Security** > **Authentication methods** > **Microsoft Authenticator**.
415+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Authentication Policy Administrator](../roles/permissions-reference.md#authentication-policy-administrator).
416+
1. Browse to **Protection** > **Authentication methods** > **Microsoft Authenticator**.
416417
1. On the **Basics** tab, click **Yes** and **All users** to enable the policy for everyone, and change **Authentication mode** to **Any**.
417418

418419
Only users who are enabled for Microsoft Authenticator here can be included in the policy to show the application name or geographic location of the sign-in, or excluded from it. Users who aren't enabled for Microsoft Authenticator can't see application name or geographic location.

0 commit comments

Comments
 (0)