Skip to content

Commit 004eb0d

Browse files
authored
Merge pull request #192629 from MicrosoftDocs/main
3/23 AM Publish
2 parents 6f8c935 + 93dd18e commit 004eb0d

File tree

91 files changed

+805
-306
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

91 files changed

+805
-306
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10774,6 +10774,11 @@
1077410774
"source_path": "articles/active-directory/reports-monitoring/reference-azure-ad-sla-performance.md",
1077510775
"redirect_url": "/azure/active-directory/reports-monitoring/overview-monitoring",
1077610776
"redirect_document_id": false
10777+
},
10778+
{
10779+
"source_path": "articles/active-directory/manage-apps/get-it-now-azure-marketplace.md",
10780+
"redirect_url": "/azure/active-directory/manage-apps/add-application-portal",
10781+
"redirect_document_id": false
1077710782
}
1077810783

1077910784
]

articles/active-directory-b2c/deploy-custom-policies-devops.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,8 @@ try {
9292
Write-Host "Uploading the" $PolicyId "policy..."
9393
9494
$graphuri = 'https://graph.microsoft.com/beta/trustframework/policies/' + $PolicyId + '/$value'
95-
$response = Invoke-RestMethod -Uri $graphuri -Method Put -Body $policycontent -Headers $headers
95+
$content = [System.Text.Encoding]::UTF8.GetBytes($policycontent)
96+
$response = Invoke-RestMethod -Uri $graphuri -Method Put -Body $content -Headers $headers
9697
9798
Write-Host "Policy" $PolicyId "uploaded successfully."
9899
}

articles/active-directory-b2c/enable-authentication-in-node-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Enable authentication in your own Node web application using Azure Active Directory B2C
3-
description: This article explains how to enable authentication in your own node.js web application using Azure AD B2C
3+
description: This article explains how to enable authentication in your own Node.js web application using Azure AD B2C
44
titleSuffix: Azure AD B2C
55
services: active-directory-b2c
66
author: kengaderdus

articles/active-directory-b2c/integrate-with-app-code-samples.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Azure Active Directory B2C integrate with app samples
2+
title: Azure Active Directory B2C integrate with app samples
33
description: Code samples for integrating Azure AD B2C to mobile, desktop, web, and single-page applications.
44
services: active-directory-b2c
55
author: kengaderdus
@@ -36,7 +36,7 @@ The following tables provide links to samples for applications including iOS, An
3636
| [dotnetcore-webapp-openidconnect](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/1-WebApp-OIDC/1-5-B2C) | An ASP.NET Core web application that uses OpenID Connect to sign in users in Azure AD B2C. |
3737
| [dotnetcore-webapp-msal-api](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/tree/master/4-WebApp-your-API/4-2-B2C) | An ASP.NET Core web application that can sign in a user using Azure AD B2C, get an access token using MSAL.NET and call an API. |
3838
| [auth-code-flow-nodejs](https://github.com/Azure-Samples/active-directory-b2c-msal-node-sign-in-sign-out-webapp) | A Node.js app that shows how to enable authentication (sign in, sign out and profile edit) in a Node.js web application using Azure Active Directory B2C. The web app uses MSAL-node.|
39-
| [javascript-nodejs-webapi](https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi) | A small node.js Web API for Azure AD B2C that shows how to protect your web api and accept B2C access tokens using passport.js. |
39+
| [javascript-nodejs-webapi](https://github.com/Azure-Samples/active-directory-b2c-javascript-nodejs-webapi) | A small Node.js Web API for Azure AD B2C that shows how to protect your web api and accept B2C access tokens using passport.js. |
4040
| [ms-identity-python-webapp](https://github.com/Azure-Samples/ms-identity-python-webapp/blob/master/README_B2C.md) | Demonstrate how to Integrate B2C of Microsoft identity platform with a Python web application. |
4141

4242
## Single page apps

articles/active-directory-b2c/threat-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ When testing the smart lockout feature, use a distinctive pattern for each passw
6060
When the smart lockout threshold is reached, you'll see the following message while the account is locked: **Your account is temporarily locked to prevent unauthorized use. Try again later**. The error messages can be [localized](localization-string-ids.md#sign-up-or-sign-in-error-messages).
6161

6262
> [!NOTE]
63-
> When you test smart lockout, your sign-in requests might be handled by different datacenters due to the geo-distributed and load-balanced nature of the Azure AD authentication service. In that scenario, because each Azure AD datacenter tracks lockout independently, it might take more than your defined lockout threshold number of attempts to cause a lockout. A user has a maximum of (threshold_limit * datacenter_count) number of bad attempts before being completely locked out.
63+
> When you test smart lockout, your sign-in requests might be handled by different datacenters due to the geo-distributed and load-balanced nature of the Azure AD authentication service. In that scenario, because each Azure AD datacenter tracks lockout independently, it might take more than your defined lockout threshold number of attempts to cause a lockout. A user has a maximum of (threshold_limit * datacenter_count) number of bad attempts before being completely locked out. For more information, see [Azure global infrastructure](https://azure.microsoft.com/global-infrastructure/).
6464
6565
## Viewing locked-out accounts
6666

articles/active-directory/azuread-dev/sample-v1-code.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ The following samples illustrate public client applications (desktop/mobile appl
8888
The following samples show desktop or web applications that access the Microsoft Graph or a web API with no user (with the application identity).
8989

9090
Client application | Platform | Flow/Grant | Calls an ASP.NET or ASP.NET Core 2.0 Web API
91-
------------------ | -------- | ---------- | --------------------
91+
------------------ | -------- | ---------- | --------------------
9292
Daemon app (Console) | ![This image shows the .NET Framework logo](media/sample-v2-code/logo-netframework.png) | Client Credentials with app secret or certificate | [dotnet-daemon](https://github.com/azure-samples/active-directory-dotnet-daemon)</p> [dotnet-daemon-certificate-credential](https://github.com/azure-samples/active-directory-dotnet-daemon-certificate-credential)
9393
Daemon app (Console) | ![This image shows the .NET Core logo](media/sample-v2-code/logo-netcore.png) | Client Credentials with certificate| [dotnetcore-daemon-certificate-credential](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-certificate-credential)
9494
ASP.NET Web App | ![This image shows the .NET Framework logo](media/sample-v2-code/logo-netframework.png) | Client credentials | [dotnet-webapp-webapi-oauth2-appidentity](https://github.com/Azure-Samples/active-directory-dotnet-webapp-webapi-oauth2-appidentity)
@@ -97,7 +97,7 @@ ASP.NET Web App | ![This image shows the .NET Framework logo](media/sample-v2-c
9797

9898
### Web API protected by Azure Active Directory
9999

100-
The following sample shows how to protect a node.js web API with Azure AD.
100+
The following sample shows how to protect a Node.js web API with Azure AD.
101101

102102
In the previous sections of this article, you can also find other samples illustrating a client application **calling** an ASP.NET or ASP.NET Core **Web API**. These samples are not mentioned again in this section, but you will find them in the last column of the tables above or below
103103

articles/active-directory/external-identities/external-collaboration-settings-configure.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,10 +71,14 @@ Here's an example that shows how to use PowerShell to add a user to the Guest In
7171
Add-MsolRoleMember -RoleObjectId 95e79109-95c0-4d8e-aee3-d01accf2d47b -RoleMemberEmailAddress <RoleMemberEmailAddress>
7272
```
7373

74+
## Sign-in logs for B2B users
75+
76+
When a B2B user signs into a resource tenant to collaborate, a sign-in log is generated in both the home tenant and the resource tenant. These logs include information such as the application being used, email addresses, tenant name, and tenant ID for both the home tenant and the resource tenant.
77+
7478
## Next steps
7579

7680
See the following articles on Azure AD B2B collaboration:
7781

7882
- [What is Azure AD B2B collaboration?](what-is-b2b.md)
7983
- [Add B2B collaboration guest users without an invitation](add-user-without-invite.md)
80-
- [Adding a B2B collaboration user to a role](./add-users-administrator.md)
84+
- [Adding a B2B collaboration user to a role](./add-users-administrator.md)

articles/active-directory/manage-apps/get-it-now-azure-marketplace.md

Lines changed: 0 additions & 23 deletions
This file was deleted.

articles/active-directory/roles/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -82,6 +82,8 @@
8282
href: admin-units-members-list.md
8383
- name: Remove members
8484
href: admin-units-members-remove.md
85+
- name: Manage members with dynamic membership rules
86+
href: admin-units-members-dynamic.md
8587
- name: Assign roles with scope
8688
href: admin-units-assign-roles.md
8789
- name: Delegate

articles/active-directory/roles/admin-units-faq-troubleshoot.yml

Lines changed: 40 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ summary: |
2020
For more granular administrative control in Azure Active Directory (Azure AD), you can assign users to an Azure AD role with a scope that's limited to one or more administrative units. For sample PowerShell scripts for common tasks, see [Work with administrative units](/powershell/azure/active-directory/working-with-administrative-units).
2121
2222
sections:
23-
- name: Ignored
23+
- name: General
2424
questions:
2525
- question: |
2626
Why am I unable to create an administrative unit?
@@ -78,6 +78,45 @@ sections:
7878
7979
Find support for the [administrativeUnit resource type](/graph/api/resources/administrativeunit) in Microsoft Graph.
8080
81+
- name: Dynamic administrative units (Preview)
82+
questions:
83+
- question: |
84+
I just saved a dynamic membership rule for an administrative unit, but I don't see any users populated yet.
85+
answer: |
86+
The initial update of an administrative unit can take a few minutes depending on your tenant size and the current Azure AD load.
87+
88+
- question: |
89+
After creating a dynamic membership rule in the Azure portal using the rule builder and attempting to save, I get the error "Failed to update administrative unit properties".
90+
answer: |
91+
This usually means there is a problem with the supplied property values. Confirm that the property values you have supplied have a proper value type (Boolean, string, or string collection). For more information, see the allowed values for each operator for [users](../enterprise-users/groups-dynamic-membership.md#supported-properties) or [devices](../enterprise-users/groups-dynamic-membership.md#rules-for-devices).
92+
93+
This error can also result if a person without an Azure AD Premium P1 license attempts to save an update to the administrative unit.
94+
95+
- question: |
96+
How can I add a single member to an administrative unit in addition to the current dynamic membership rule?
97+
answer: |
98+
To add a single user, add an appropriate expression with the `OR` query operator to the dynamic membership rule.
99+
100+
- question: |
101+
I am a Global Administrator, but I can't add or remove members for an administrative unit.
102+
answer: |
103+
When an administrative unit has been configured for dynamic membership, you must edit the dynamic membership rules to change membership.
104+
105+
- question: |
106+
How many administrative units with dynamic membership rules can I create in a tenant?
107+
answer: |
108+
For the preview, the total number of dynamic groups and dynamic administrative units combined cannot exceed 5,000.
109+
110+
- question: |
111+
Is there a limit to the number of characters in a dynamic membership rule?
112+
answer: |
113+
Yes. 3,072 characters.
114+
115+
- question: |
116+
Can I create administrative units with dynamic membership rules in the Microsoft 365 admin center?
117+
answer: |
118+
No.
119+
81120
additionalContent: |
82121
83122
## Next steps

0 commit comments

Comments
 (0)