You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -439,7 +434,7 @@ Add a user journey that uses the new claims, as shown in the following example:
439
434
</OrchestrationStep>
440
435
441
436
<!--Save MFA phone number: The precondition verifies whether the user provided a new number in the previous step. If so, the phone number is stored in the directory for future authentication requests.-->
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/concept-sspr-policy.md
+3-1
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ The following password policy options are defined:
58
58
59
59
## Administrator reset policy differences
60
60
61
-
Microsoft enforces a strong default *two-gate* password reset policy for any Azure administrator role. This policy may be different from the one you have defined for your users, and this policy can't be changed. You should always test password reset functionality as a user without any Azure administrator roles assigned.
61
+
By default, administrator accounts are enabled for self-service password reset, and a strong default *two-gate* password reset policy is enforced. This policy may be different from the one you have defined for your users, and this policy can't be changed. You should always test password reset functionality as a user without any Azure administrator roles assigned.
62
62
63
63
With a two-gate policy, administrators don't have the ability to use security questions.
64
64
@@ -91,6 +91,8 @@ The two-gate policy requires two pieces of authentication data, such as an email
91
91
* A custom domain has been configured for your Azure AD tenant, such as *contoso.com*; or
92
92
* Azure AD Connect is synchronizing identities from your on-premises directory
93
93
94
+
You can disable the use of SSPR for administrator accounts using the [Set-MsolCompanySettings](/powershell/module/msonline/set-msolcompanysettings?view=azureadps-1.0) PowerShell cmdlet. The `-SelfServePasswordResetEnabled $False` parameter disables SSPR for administrators.
95
+
94
96
### Exceptions
95
97
96
98
A one-gate policy requires one piece of authentication data, such as an email address or phone number. A one-gate policy applies in the following circumstances:
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-mfa-mfasettings.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ To configure account lockout settings, complete the following settings:
54
54
55
55
## Block and unblock users
56
56
57
-
If a user's device has been lost or stolen, you can block authentication attempts for the associated account. Any authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they are blocked.
57
+
If a user's device has been lost or stolen, you can block Azure Multi-Factor Authentication attempts for the associated account. Any Azure Multi-Factor Authentication attempts for blocked users are automatically denied. Users remain blocked for 90 days from the time that they are blocked.
58
58
59
59
### Block a user
60
60
@@ -82,7 +82,7 @@ The fraud alert feature lets users report fraudulent attempts to access their re
82
82
83
83
The following fraud alert configuration options are available:
84
84
85
-
***Automatically block users who report fraud**: If a user reports fraud, their account is blocked for 90 days or until an administrator unblocks their account. An administrator can review sign-ins by using the sign-in report, and take appropriate action to prevent future fraud. An administrator can then [unblock](#unblock-a-user) the user's account.
85
+
***Automatically block users who report fraud**: If a user reports fraud, the Azure MFA authentication attempts for the user account are blocked for 90 days or until an administrator unblocks their account. An administrator can review sign-ins by using the sign-in report, and take appropriate action to prevent future fraud. An administrator can then [unblock](#unblock-a-user) the user's account.
86
86
***Code to report fraud during initial greeting**: When users receive a phone call to perform multi-factor authentication, they normally press **#** to confirm their sign-in. To report fraud, the user enters a code before pressing **#**. This code is **0** by default, but you can customize it.
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/tutorial-enable-sspr.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -115,7 +115,7 @@ If users need additional help with the SSPR process, you can customize the link
115
115
With SSPR enabled and configured, test the SSPR process with a user that's part of the group you selected in the previous section, such as *Test-SSPR-Group*. In the following example, the *testuser* account is used. Provide your own user account that's part of the group you enabled for SSPR in the first section of this tutorial.
116
116
117
117
> [!NOTE]
118
-
> When you test the self-service password reset, use a non-administrator account. Admins are always enabled for self-service password reset and are required to use two authentication methods to reset their password.
118
+
> When you test self-service password reset, use a non-administrator account. By default, admins are enabled for self-service password reset and are required to use two authentication methods to reset their password. For more information, see [Administrator reset policy differences](concept-sspr-policy.md#administrator-reset-policy-differences).
119
119
120
120
1. To see the manual registration process, open a new browser window in InPrivate or incognito mode, and browse to [https://aka.ms/ssprsetup](https://aka.ms/ssprsetup). Users should be directed to this registration portal when they next sign-in.
121
121
1. Sign in with a non-administrator test user, such as *testuser*, and register your authentication methods contact information.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/app-objects-and-service-principals.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ To access resources that are secured by an Azure AD tenant, the entity that requ
45
45
46
46
A service principal is the local representation, or application instance, of a global application object in a single tenant or directory. A service principal is a concrete instance created from the application object and inherits certain properties from that application object. A service principal is created in each tenant where the application is used and references the globally unique app object. The service principal object defines what the app can actually do in the specific tenant, who can access the app, and what resources the app can access.
47
47
48
-
When an application is given permission to access resources in a tenant (upon registration or [consent](developer-glossary.md#consent)), a service principal object is created. You can also create service principal object in a tenant using [Azure PowerShell](howto-authenticate-service-principal-powershell.md), Azure CLI, [Microsoft Graph](/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http), the [Azure portal][AZURE-Portal], and other tools. When using the portal, a service principal is created automatically when you register an application.
48
+
When an application is given permission to access resources in a tenant (upon registration or [consent](developer-glossary.md#consent)), a service principal object is created. You can also create service principal object in a tenant using [Azure PowerShell](howto-authenticate-service-principal-powershell.md), [Azure CLI](/cli/azure/create-an-azure-service-principal-azure-cli?view=azure-cli-latest), [Microsoft Graph](/graph/api/serviceprincipal-post-serviceprincipals?view=graph-rest-1.0&tabs=http), the [Azure portal][AZURE-Portal], and other tools. When using the portal, a service principal is created automatically when you register an application.
49
49
50
50
The **Enterprise applications** blade in the portal is used to list and manage the service principals in a tenant. You can see the service principal's permissions, user consented permissions, which users have done that consent, sign in information, and more.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/concept-primary-refresh-token.md
+3
Original file line number
Diff line number
Diff line change
@@ -197,6 +197,9 @@ The following diagrams illustrate the underlying details in issuing, renewing, a
197
197
| E | The native client host will return this PRT cookie to the browser, which will include it as part of the request header called x-ms-RefreshTokenCredential and request tokens from Azure AD. |
198
198
| F | Azure AD validates the Session key signature on the PRT cookie, validates the nonce, verifies that the device is valid in the tenant, and issues an ID token for the web page and an encrypted session cookie for the browser. |
199
199
200
+
> [!NOTE]
201
+
> The Browser SSO flow described in the steps above does not apply for sessions in private modes such as InPrivate in Microsoft Edge, or Incognito in Google Chrome (when using the Microsoft Accounts extension).
202
+
200
203
## Next steps
201
204
202
205
For more information on troubleshooting PRT-related issues, see the article [Troubleshooting hybrid Azure Active Directory joined Windows 10 and Windows Server 2016 devices](troubleshoot-hybrid-join-windows-current.md).
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/invitation-email-elements.md
+16-2
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: B2B
8
8
ms.topic: conceptual
9
-
ms.date: 04/15/2020
9
+
ms.date: 09/28/2020
10
10
11
11
ms.author: mimart
12
12
author: msmimart
@@ -72,7 +72,21 @@ The next section of the email contains information about where the invitee will
72
72
The footer contains more information about the invitation being sent. There is always an option for the invitee to block future invitations. If the organization has [set a privacy statement](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-properties-area), the link to the statement is displayed here. Otherwise, a note indicates the organization hasn't set a privacy statement.
73
73
74
74

75
-
75
+
76
+
### Blocking an organization (unsubscribing)
77
+
78
+
In the invitation from an organization, the footer contains an option to **Block future invitations**. A guest user can select this link to block any future invitations from the organization. This action also adds the organization to the user's unsubscribed list at [https://invitations.microsoft.com/unsubscribe/manage](https://invitations.microsoft.com/unsubscribe/manage).
79
+
80
+
### Viewing organizations you've blocked
81
+
82
+
A guest user can follow these steps to view or export the organizations they've blocked:
83
+
84
+
1. Go to [https://invitations.microsoft.com/unsubscribe/manage](https://invitations.microsoft.com/unsubscribe/manage).
85
+
2. Enter your email and follow the sign-in steps for email one-time passcode authentication.
86
+
3. View the organizations you've blocked, or export the names using copy and paste.
87
+
> [!NOTE]
88
+
> If you want to allow an organization you’ve blocked to invite you again, you can choose the organization and select **Next**.
89
+
76
90
## How the language is determined
77
91
78
92
The language presented to the guest user in the invitation email is determined by the following settings. These settings are listed in order of precedence. If a setting isn’t configured, the next setting in the list determines the language.
0 commit comments