You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<LocalizedStringElementType="ClaimType"ElementId="emailVerificationCode"StringId="UserHelpText">Verification code received in the email.</LocalizedString>
568
554
<LocalizedStringElementType="ClaimType"ElementId="emailVerificationCode"StringId="AdminHelpText">Verification code received in the email.</LocalizedString>
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</LocalizedString>
572
558
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</LocalizedString>
559
+
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfMaxNumberOfCodeGenerated">You have exceeded the number of code generation attempts allowed.</LocalizedString>
573
560
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfInvalidCode">You have entered the wrong code.</LocalizedString>
574
561
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</LocalizedString>
575
562
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfVerificationFailedRetryAllowed">The verification has failed, please try again.</LocalizedString>
576
563
</LocalizedStrings>
577
564
</LocalizedResources>
578
565
```
579
566
580
-
After you add the localized strings, remove the OTP validation error messages metadata from the LocalAccountSignUpWithLogonEmail and LocalAccountDiscoveryUsingEmailAddress technical profiles.
<LocalizedStringElementType="ClaimType"ElementId="emailVerificationCode"StringId="UserHelpText">Verification code received in the email.</LocalizedString>
552
538
<LocalizedStringElementType="ClaimType"ElementId="emailVerificationCode"StringId="AdminHelpText">Verification code received in the email.</LocalizedString>
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</LocalizedString>
556
542
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</LocalizedString>
543
+
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfMaxNumberOfCodeGenerated">You have exceeded the number of code generation attempts allowed.</LocalizedString>
557
544
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfInvalidCode">You have entered the wrong code.</LocalizedString>
558
545
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</LocalizedString>
559
546
<LocalizedStringElementType="ErrorMessage"StringId="UserMessageIfVerificationFailedRetryAllowed">The verification has failed, please try again.</LocalizedString>
560
547
</LocalizedStrings>
561
548
</LocalizedResources>
562
549
```
563
550
564
-
After you add the localized strings, remove the OTP validation error messages metadata from the LocalAccountSignUpWithLogonEmail and LocalAccountDiscoveryUsingEmailAddress technical profiles.
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/overview.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Azure Active Directory B2C provides business-to-customer identity as a service.
21
21
22
22
Azure AD B2C is a customer identity access management (CIAM) solution capable of supporting millions of users and billions of authentications per day. It takes care of the scaling and safety of the authentication platform, monitoring, and automatically handling threats like denial-of-service, password spray, or brute force attacks.
23
23
24
-
Azure AD B2C is a separate service from [Azure Active Directory (Azure AD)](../active-directory/fundamentals/active-directory-whatis.md). It is built on the same technology as Azure AD but for a different purpose. It allows businesses to build customer facing application, and then allow anyone to sign up into those applications with no restrictions on user account.
24
+
Azure AD B2C is a separate service from [Azure Active Directory (Azure AD)](../active-directory/fundamentals/active-directory-whatis.md). It is built on the same technology as Azure AD but for a different purpose. It allows businesses to build customer facing applications, and then allow anyone to sign up into those applications with no restrictions on user account.
25
25
26
26
## Who uses Azure AD B2C?
27
27
Any business or individual who wishes to authenticate end users to their web/mobile applications using a white-label authentication solution. Apart from authentication, Azure AD B2C service is used for authorization such as access to API resources by authenticated users. Azure AD B2C is meant to be used by **IT administrators** and **developers**.
@@ -132,4 +132,4 @@ Now that you have an idea of what Azure AD B2C is and some of the scenarios it c
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md
+43-6
Original file line number
Diff line number
Diff line change
@@ -70,6 +70,27 @@ The following scenarios aren't supported:
70
70
-*Run as* by using a security key.
71
71
- Log in to a server by using a security key.
72
72
73
+
74
+
## Install the Azure AD Kerberos PowerShell module
75
+
76
+
The [Azure AD Kerberos PowerShell module](https://www.powershellgallery.com/packages/AzureADHybridAuthenticationManagement) provides FIDO2 management features for administrators.
77
+
78
+
1. Open a PowerShell prompt using the Run as administrator option.
79
+
1. Install the Azure AD Kerberos PowerShell module:
80
+
81
+
```powershell
82
+
# First, ensure TLS 1.2 for PowerShell gallery access.
> - The Azure AD Kerberos PowerShell module uses the [AzureADPreview PowerShell module](https://www.powershellgallery.com/packages/AzureADPreview) to provide advanced Azure Active Directory management features. If the [AzureAD PowerShell module](https://www.powershellgallery.com/packages/AzureAD) is already installed on your local computer, the installation described here might fail because of conflict. To prevent any conflicts during installation, be sure to include the "-AllowClobber" option flag.
91
+
> - You can install the Azure AD Kerberos PowerShell module on any computer from which you can access your on-premises Active Directory Domain Controller, without dependency on the Azure AD Connect solution.
92
+
> - The Azure AD Kerberos PowerShell module is distributed through the [PowerShell Gallery](https://www.powershellgallery.com/). The PowerShell Gallery is the central repository for PowerShell content. In it, you can find useful PowerShell modules that contain PowerShell commands and Desired State Configuration (DSC) resources.
93
+
73
94
## Create a Kerberos Server object
74
95
75
96
Administrators use PowerShell tools from their Azure AD Connect server to create an Azure AD Kerberos Server object in their on-premises directory. Run the following steps in each domain and forest in your organization that contains Azure AD users:
@@ -99,6 +120,23 @@ Administrators use PowerShell tools from their Azure AD Connect server to create
> If you're working on a domain-joined machine with an account that has domain administrator privileges, you can skip the "-DomainCredential" parameter. If the "-DomainCredential" parameter isn't provided, the current Windows login credential is used to access your on-premises Active Directory Domain Controller.
125
+
126
+
```powershell
127
+
# Specify the on-premises Active Directory domain. A new Azure AD
128
+
# Kerberos Server object will be created in this Active Directory domain.
129
+
$domain = "contoso.corp.com"
130
+
131
+
# Enter an Azure Active Directory global administrator username and password.
132
+
$cloudCred = Get-Credential
133
+
134
+
# Create the new Azure AD Kerberos Server object in Active Directory
135
+
# and then publish it to Azure Active Directory.
136
+
# Use the current windows login credential to access the on-prem AD.
> If your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator.
104
142
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
@@ -119,23 +157,22 @@ Administrators use PowerShell tools from their Azure AD Connect server to create
119
157
120
158
# Create the new Azure AD Kerberos Server object in Active Directory
121
159
# and then publish it to Azure Active Directory.
160
+
# Open an interactive sign-in prompt with given username to access the Azure AD.
This command outputs the properties of the Azure AD Kerberos Server. You can review the properties to verify that everything is in good order.
134
173
135
174
> [!NOTE]
136
-
> Running against another domain by supplying the credential would connect over NTLM but would then fail if the users are part of the Protected Users security group in Azure AD.
137
-
>
138
-
> As a workaround, log in with another domain user to the Azure AD Connect box and don’t supply a -domainCredential, because doing so would consume the Kerebros ticket of the currently logged in user. You can confirm by executing `whoami /groups` to validate whether the user has the required permissions in Azure AD to execute the preceding command.
175
+
> Running against another domain by supplying the credential will connect over NTLM, and then it fails. If the users are in the Protected Users security group in Active Directory, complete these steps to resolve the issue: Sign in as another domain user in **ADConnect** and don’t supply "-domainCredential". The Kereberos ticket of the user that's currently signed in is used. You can confirm by executing `whoami /groups` to validate whether the user has the required permissions in Active Directory to execute the preceding command.
139
176
140
177
| Property | Description |
141
178
| --- | --- |
@@ -159,15 +196,15 @@ The Azure AD Kerberos Server encryption *krbtgt* keys should be rotated on a reg
159
196
> [!WARNING]
160
197
> There are other tools that could rotate the *krbtgt* keys. However, you must use the tools mentioned in this document to rotate the *krbtgt* keys of your Azure AD Kerberos Server. This ensures that the keys are updated in both on-premises Active Directory and Azure AD.
If you want to revert the scenario and remove the Azure AD Kerberos Server from both the on-premises Active Directory and Azure AD, run the following command:
Copy file name to clipboardExpand all lines: articles/active-directory/develop/developer-guide-conditional-access-authentication-context.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ The following are the prerequisites and the steps if you want to use Conditional
41
41
42
42
### Prerequisites
43
43
44
-
**First**, your app should be integrated with the Microsoft Identity Platform using the use [OpenID Connect](v2-protocols-oidc.md)/ [OAuth 2.0](v2-oauth2-auth-code-flow.md) protocols for authentication and authorization. We recommend you use [Microsoft identity platform authentication libraries](reference-v2-libraries.md) to integrate and secure your application with Azure Active Directory. [Microsoft identity platform documentation](index.yml) is a good place to start learning how to integrate your apps with the Microsoft Identity Platform. Conditional Access Auth Context feature support is built on top of protocol extensions provided by the industry standard[OpenID Connect](v2-protocols-oidc.md) protocol. Developers use a [Conditional Access Auth Context reference](/graph/api/resources/authenticationcontextclassreference)**value** with the [Claims Request](claims-challenge.md) parameter to give apps a way to trigger and satisfy policy.
44
+
**First**, your app should be integrated with the Microsoft Identity Platform using the use [OpenID Connect](v2-protocols-oidc.md)/ [OAuth 2.0](v2-oauth2-auth-code-flow.md) protocols for authentication and authorization. We recommend you use [Microsoft identity platform authentication libraries](reference-v2-libraries.md) to integrate and secure your application with Azure Active Directory. [Microsoft identity platform documentation](index.yml) is a good place to start learning how to integrate your apps with the Microsoft Identity Platform. Conditional Access Auth Context feature support is built on top of protocol extensions provided by the industry standard[OpenID Connect](v2-protocols-oidc.md) protocol. Developers use a [Conditional Access Auth Context reference](/graph/api/conditionalaccessroot-list-authenticationcontextclassreferences)**value** with the [Claims Request](claims-challenge.md) parameter to give apps a way to trigger and satisfy policy.
45
45
46
46
**Second**, [Conditional Access](../conditional-access/overview.md) requires Azure AD Premium P1 licensing. More information about licensing can be found on the [Azure AD pricing page](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/how-to-connect-pta-disable-do-not-configure.md
+7-2
Original file line number
Diff line number
Diff line change
@@ -13,8 +13,11 @@ ms.author: billmath
13
13
ms.collection: M365-identity-device-management
14
14
---
15
15
16
+
# Disable PTA
16
17
17
-
# Disable PTA when using Azure AD Connect
18
+
To disable PTA, complete the steps that are described in [Disable PTA when using Azure AD Connect](#disable-pta-when-using-azure-ad-connect) and [Disable PTA in PowerShell](#disable-pta-in-powershell) in this article.
19
+
20
+
## Disable PTA when using Azure AD Connect
18
21
19
22
If you are using Pass-through Authentication with Azure AD Connect and you have it set to **"Do not configure"**, you can disable it.
20
23
@@ -40,8 +43,10 @@ The following prerequisites are required:
40
43
>| AzureUSGovernment | US Gov|
41
44
42
45
43
-
## To disable PTA
46
+
## Disable PTA in PowerShell
47
+
44
48
From within a PowerShell session, use the following to disable PTA:
0 commit comments