Skip to content

Commit 8d24106

Browse files
authored
Merge branch 'master' into repo_sync_working_branch
2 parents 664bfee + b39e48a commit 8d24106

File tree

46 files changed

+187
-141
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

46 files changed

+187
-141
lines changed

articles/active-directory-b2c/custom-email-mailjet.md

+2-16
Original file line numberDiff line numberDiff line change
@@ -406,13 +406,6 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
406406
<DisplayName>Local Account</DisplayName>
407407
<TechnicalProfiles>
408408
<TechnicalProfile Id="LocalAccountSignUpWithLogonEmail">
409-
<Metadata>
410-
<!--OTP validation error messages-->
411-
<Item Key="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</Item>
412-
<Item Key="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</Item>
413-
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
414-
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
415-
</Metadata>
416409
<DisplayClaims>
417410
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
418411
<DisplayClaim ClaimTypeReferenceId="displayName" Required="true" />
@@ -423,13 +416,6 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
423416
</DisplayClaims>
424417
</TechnicalProfile>
425418
<TechnicalProfile Id="LocalAccountDiscoveryUsingEmailAddress">
426-
<Metadata>
427-
<!--OTP validation error messages-->
428-
<Item Key="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</Item>
429-
<Item Key="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</Item>
430-
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
431-
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
432-
</Metadata>
433419
<DisplayClaims>
434420
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
435421
</DisplayClaims>
@@ -566,18 +552,18 @@ The Localization element allows you to support multiple locales or languages in
566552
<LocalizedString ElementType="ClaimType" ElementId="emailVerificationCode" StringId="DisplayName">Verification Code</LocalizedString>
567553
<LocalizedString ElementType="ClaimType" ElementId="emailVerificationCode" StringId="UserHelpText">Verification code received in the email.</LocalizedString>
568554
<LocalizedString ElementType="ClaimType" ElementId="emailVerificationCode" StringId="AdminHelpText">Verification code received in the email.</LocalizedString>
569-
<LocalizedString ElementType="ClaimType" ElementId="email" StringId="DisplayName">Eamil</LocalizedString>
555+
<LocalizedString ElementType="ClaimType" ElementId="email" StringId="DisplayName">Email</LocalizedString>
570556
<!-- Email validation error messages-->
571557
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</LocalizedString>
572558
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</LocalizedString>
559+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfMaxNumberOfCodeGenerated">You have exceeded the number of code generation attempts allowed.</LocalizedString>
573560
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfInvalidCode">You have entered the wrong code.</LocalizedString>
574561
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</LocalizedString>
575562
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfVerificationFailedRetryAllowed">The verification has failed, please try again.</LocalizedString>
576563
</LocalizedStrings>
577564
</LocalizedResources>
578565
```
579566

580-
After you add the localized strings, remove the OTP validation error messages metadata from the LocalAccountSignUpWithLogonEmail and LocalAccountDiscoveryUsingEmailAddress technical profiles.
581567

582568
## Next steps
583569

articles/active-directory-b2c/custom-email-sendgrid.md

+2-16
Original file line numberDiff line numberDiff line change
@@ -392,13 +392,6 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
392392
<DisplayName>Local Account</DisplayName>
393393
<TechnicalProfiles>
394394
<TechnicalProfile Id="LocalAccountSignUpWithLogonEmail">
395-
<Metadata>
396-
<!--OTP validation error messages-->
397-
<Item Key="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</Item>
398-
<Item Key="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</Item>
399-
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
400-
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
401-
</Metadata>
402395
<DisplayClaims>
403396
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
404397
<DisplayClaim ClaimTypeReferenceId="displayName" Required="true" />
@@ -409,13 +402,6 @@ For more information, see [Self-asserted technical profile](restful-technical-pr
409402
</DisplayClaims>
410403
</TechnicalProfile>
411404
<TechnicalProfile Id="LocalAccountDiscoveryUsingEmailAddress">
412-
<Metadata>
413-
<!--OTP validation error messages-->
414-
<Item Key="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</Item>
415-
<Item Key="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</Item>
416-
<Item Key="UserMessageIfInvalidCode">You have entered the wrong code.</Item>
417-
<Item Key="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</Item>
418-
</Metadata>
419405
<DisplayClaims>
420406
<DisplayClaim DisplayControlReferenceId="emailVerificationControl" />
421407
</DisplayClaims>
@@ -550,18 +536,18 @@ The Localization element allows you to support multiple locales or languages in
550536
<LocalizedString ElementType="ClaimType" ElementId="emailVerificationCode" StringId="DisplayName">Verification Code</LocalizedString>
551537
<LocalizedString ElementType="ClaimType" ElementId="emailVerificationCode" StringId="UserHelpText">Verification code received in the email.</LocalizedString>
552538
<LocalizedString ElementType="ClaimType" ElementId="emailVerificationCode" StringId="AdminHelpText">Verification code received in the email.</LocalizedString>
553-
<LocalizedString ElementType="ClaimType" ElementId="email" StringId="DisplayName">Eamil</LocalizedString>
539+
<LocalizedString ElementType="ClaimType" ElementId="email" StringId="DisplayName">Email</LocalizedString>
554540
<!-- Email validation error messages-->
555541
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfSessionDoesNotExist">You have exceeded the maximum time allowed.</LocalizedString>
556542
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfMaxRetryAttempted">You have exceeded the number of retries allowed.</LocalizedString>
543+
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfMaxNumberOfCodeGenerated">You have exceeded the number of code generation attempts allowed.</LocalizedString>
557544
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfInvalidCode">You have entered the wrong code.</LocalizedString>
558545
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfSessionConflict">Cannot verify the code, please try again later.</LocalizedString>
559546
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfVerificationFailedRetryAllowed">The verification has failed, please try again.</LocalizedString>
560547
</LocalizedStrings>
561548
</LocalizedResources>
562549
```
563550

564-
After you add the localized strings, remove the OTP validation error messages metadata from the LocalAccountSignUpWithLogonEmail and LocalAccountDiscoveryUsingEmailAddress technical profiles.
565551

566552
## Next steps
567553

articles/active-directory-b2c/overview.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Azure Active Directory B2C provides business-to-customer identity as a service.
2121

2222
Azure AD B2C is a customer identity access management (CIAM) solution capable of supporting millions of users and billions of authentications per day. It takes care of the scaling and safety of the authentication platform, monitoring, and automatically handling threats like denial-of-service, password spray, or brute force attacks.
2323

24-
Azure AD B2C is a separate service from [Azure Active Directory (Azure AD)](../active-directory/fundamentals/active-directory-whatis.md). It is built on the same technology as Azure AD but for a different purpose. It allows businesses to build customer facing application, and then allow anyone to sign up into those applications with no restrictions on user account.
24+
Azure AD B2C is a separate service from [Azure Active Directory (Azure AD)](../active-directory/fundamentals/active-directory-whatis.md). It is built on the same technology as Azure AD but for a different purpose. It allows businesses to build customer facing applications, and then allow anyone to sign up into those applications with no restrictions on user account.
2525

2626
## Who uses Azure AD B2C?
2727
Any business or individual who wishes to authenticate end users to their web/mobile applications using a white-label authentication solution. Apart from authentication, Azure AD B2C service is used for authorization such as access to API resources by authenticated users. Azure AD B2C is meant to be used by **IT administrators** and **developers**.
@@ -132,4 +132,4 @@ Now that you have an idea of what Azure AD B2C is and some of the scenarios it c
132132
133133
<!-- LINKS - External -->
134134
[woodgrove]: https://aka.ms/ciamdemo
135-
[woodgrove-repo]: https://github.com/Azure-Samples/active-directory-external-identities-woodgrove-demo
135+
[woodgrove-repo]: https://github.com/Azure-Samples/active-directory-external-identities-woodgrove-demo

articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md

+43-6
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,27 @@ The following scenarios aren't supported:
7070
- *Run as* by using a security key.
7171
- Log in to a server by using a security key.
7272

73+
74+
## Install the Azure AD Kerberos PowerShell module
75+
76+
The [Azure AD Kerberos PowerShell module](https://www.powershellgallery.com/packages/AzureADHybridAuthenticationManagement) provides FIDO2 management features for administrators.
77+
78+
1. Open a PowerShell prompt using the Run as administrator option.
79+
1. Install the Azure AD Kerberos PowerShell module:
80+
81+
```powershell
82+
# First, ensure TLS 1.2 for PowerShell gallery access.
83+
[Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12
84+
85+
# Install the Azure AD Kerberos PowerShell Module.
86+
Install-Module -Name AzureADHybridAuthenticationManagement -AllowClobber
87+
```
88+
89+
> [!NOTE]
90+
> - The Azure AD Kerberos PowerShell module uses the [AzureADPreview PowerShell module](https://www.powershellgallery.com/packages/AzureADPreview) to provide advanced Azure Active Directory management features. If the [AzureAD PowerShell module](https://www.powershellgallery.com/packages/AzureAD) is already installed on your local computer, the installation described here might fail because of conflict. To prevent any conflicts during installation, be sure to include the "-AllowClobber" option flag.
91+
> - You can install the Azure AD Kerberos PowerShell module on any computer from which you can access your on-premises Active Directory Domain Controller, without dependency on the Azure AD Connect solution.
92+
> - The Azure AD Kerberos PowerShell module is distributed through the [PowerShell Gallery](https://www.powershellgallery.com/). The PowerShell Gallery is the central repository for PowerShell content. In it, you can find useful PowerShell modules that contain PowerShell commands and Desired State Configuration (DSC) resources.
93+
7394
## Create a Kerberos Server object
7495

7596
Administrators use PowerShell tools from their Azure AD Connect server to create an Azure AD Kerberos Server object in their on-premises directory. Run the following steps in each domain and forest in your organization that contains Azure AD users:
@@ -99,6 +120,23 @@ Administrators use PowerShell tools from their Azure AD Connect server to create
99120
Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred
100121
```
101122

123+
> [!NOTE]
124+
> If you're working on a domain-joined machine with an account that has domain administrator privileges, you can skip the "-DomainCredential" parameter. If the "-DomainCredential" parameter isn't provided, the current Windows login credential is used to access your on-premises Active Directory Domain Controller.
125+
126+
```powershell
127+
# Specify the on-premises Active Directory domain. A new Azure AD
128+
# Kerberos Server object will be created in this Active Directory domain.
129+
$domain = "contoso.corp.com"
130+
131+
# Enter an Azure Active Directory global administrator username and password.
132+
$cloudCred = Get-Credential
133+
134+
# Create the new Azure AD Kerberos Server object in Active Directory
135+
# and then publish it to Azure Active Directory.
136+
# Use the current windows login credential to access the on-prem AD.
137+
Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred
138+
```
139+
102140
> [!NOTE]
103141
> If your organization protects password-based sign-in and enforces modern authentication methods such as multifactor authentication, FIDO2, or smart card technology, you must use the `-UserPrincipalName` parameter with the User Principal Name (UPN) of a global administrator.
104142
> - Replace `contoso.corp.com` in the following example with your on-premises Active Directory domain name.
@@ -119,23 +157,22 @@ Administrators use PowerShell tools from their Azure AD Connect server to create
119157
120158
# Create the new Azure AD Kerberos Server object in Active Directory
121159
# and then publish it to Azure Active Directory.
160+
# Open an interactive sign-in prompt with given username to access the Azure AD.
122161
Set-AzureADKerberosServer -Domain $domain -UserPrincipalName $userPrincipalName -DomainCredential $domainCred
123162
```
124163

125164
### View and verify the Azure AD Kerberos Server
126165

127166
You can view and verify the newly created Azure AD Kerberos Server by using the following command:
128167

129-
```powerShell
168+
```powershell
130169
Get-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred
131170
```
132171

133172
This command outputs the properties of the Azure AD Kerberos Server. You can review the properties to verify that everything is in good order.
134173

135174
> [!NOTE]
136-
> Running against another domain by supplying the credential would connect over NTLM but would then fail if the users are part of the Protected Users security group in Azure AD.
137-
>
138-
> As a workaround, log in with another domain user to the Azure AD Connect box and don’t supply a -domainCredential, because doing so would consume the Kerebros ticket of the currently logged in user. You can confirm by executing `whoami /groups` to validate whether the user has the required permissions in Azure AD to execute the preceding command.
175+
> Running against another domain by supplying the credential will connect over NTLM, and then it fails. If the users are in the Protected Users security group in Active Directory, complete these steps to resolve the issue: Sign in as another domain user in **ADConnect** and don’t supply "-domainCredential". The Kereberos ticket of the user that's currently signed in is used. You can confirm by executing `whoami /groups` to validate whether the user has the required permissions in Active Directory to execute the preceding command.
139176
140177
| Property | Description |
141178
| --- | --- |
@@ -159,15 +196,15 @@ The Azure AD Kerberos Server encryption *krbtgt* keys should be rotated on a reg
159196
> [!WARNING]
160197
> There are other tools that could rotate the *krbtgt* keys. However, you must use the tools mentioned in this document to rotate the *krbtgt* keys of your Azure AD Kerberos Server. This ensures that the keys are updated in both on-premises Active Directory and Azure AD.
161198
162-
```powerShell
199+
```powershell
163200
Set-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred -RotateServerKey
164201
```
165202

166203
### Remove the Azure AD Kerberos Server
167204

168205
If you want to revert the scenario and remove the Azure AD Kerberos Server from both the on-premises Active Directory and Azure AD, run the following command:
169206

170-
```powerShell
207+
```powershell
171208
Remove-AzureADKerberosServer -Domain $domain -CloudCredential $cloudCred -DomainCredential $domainCred
172209
```
173210

articles/active-directory/develop/developer-guide-conditional-access-authentication-context.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ The following are the prerequisites and the steps if you want to use Conditional
4141

4242
### Prerequisites
4343

44-
**First**, your app should be integrated with the Microsoft Identity Platform using the use [OpenID Connect](v2-protocols-oidc.md)/ [OAuth 2.0](v2-oauth2-auth-code-flow.md) protocols for authentication and authorization. We recommend you use [Microsoft identity platform authentication libraries](reference-v2-libraries.md) to integrate and secure your application with Azure Active Directory. [Microsoft identity platform documentation](index.yml) is a good place to start learning how to integrate your apps with the Microsoft Identity Platform. Conditional Access Auth Context feature support is built on top of protocol extensions provided by the industry standard[OpenID Connect](v2-protocols-oidc.md) protocol. Developers use a [Conditional Access Auth Context reference](/graph/api/resources/authenticationcontextclassreference) **value** with the [Claims Request](claims-challenge.md) parameter to give apps a way to trigger and satisfy policy.
44+
**First**, your app should be integrated with the Microsoft Identity Platform using the use [OpenID Connect](v2-protocols-oidc.md)/ [OAuth 2.0](v2-oauth2-auth-code-flow.md) protocols for authentication and authorization. We recommend you use [Microsoft identity platform authentication libraries](reference-v2-libraries.md) to integrate and secure your application with Azure Active Directory. [Microsoft identity platform documentation](index.yml) is a good place to start learning how to integrate your apps with the Microsoft Identity Platform. Conditional Access Auth Context feature support is built on top of protocol extensions provided by the industry standard [OpenID Connect](v2-protocols-oidc.md) protocol. Developers use a [Conditional Access Auth Context reference](/graph/api/conditionalaccessroot-list-authenticationcontextclassreferences) **value** with the [Claims Request](claims-challenge.md) parameter to give apps a way to trigger and satisfy policy.
4545

4646
**Second**, [Conditional Access](../conditional-access/overview.md) requires Azure AD Premium P1 licensing. More information about licensing can be found on the [Azure AD pricing page](https://www.microsoft.com/security/business/identity-access-management/azure-ad-pricing).
4747

articles/active-directory/hybrid/how-to-connect-pta-disable-do-not-configure.md

+7-2
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,11 @@ ms.author: billmath
1313
ms.collection: M365-identity-device-management
1414
---
1515

16+
# Disable PTA
1617

17-
# Disable PTA when using Azure AD Connect
18+
To disable PTA, complete the steps that are described in [Disable PTA when using Azure AD Connect](#disable-pta-when-using-azure-ad-connect) and [Disable PTA in PowerShell](#disable-pta-in-powershell) in this article.
19+
20+
## Disable PTA when using Azure AD Connect
1821

1922
If you are using Pass-through Authentication with Azure AD Connect and you have it set to **"Do not configure"**, you can disable it.
2023

@@ -40,8 +43,10 @@ The following prerequisites are required:
4043
>| AzureUSGovernment | US Gov|
4144
4245

43-
## To disable PTA
46+
## Disable PTA in PowerShell
47+
4448
From within a PowerShell session, use the following to disable PTA:
49+
4550
1. PS C:\Program Files\Microsoft Azure AD Connect Authentication Agent> `Import-Module .\Modules\PassthroughAuthPSModule`
4651
2. `Get-PassthroughAuthenticationEnablementStatus -Feature PassthroughAuth` or `Get-PassthroughAuthenticationEnablementStatus -Feature PassthroughAuth -EnvironmentName <identifier>`
4752
3. `Disable-PassthroughAuthentication -Feature PassthroughAuth` or `Disable-PassthroughAuthentication -Feature PassthroughAuth -EnvironmentName <identifier>`

0 commit comments

Comments
 (0)