You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/howto-conditional-access-session-lifetime.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ The Azure AD default for browser session persistence allows users on personal de
50
50
Conditional access is an Azure AD Premium capability and requires a premium license. If you would like to learn more about conditional access, see [What is conditional access in Azure Active Directory?](overview.md#license-requirements)
51
51
52
52
> [!WARNING]
53
-
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on October 15 and replace it with the conditional access authentication session management feature.
53
+
> If you are using the [configurable token lifetime](../develop/active-directory-configurable-token-lifetimes.md) feature currently in public preview, please note that we don’t support creating two different policies for the same user or app combination: one with this feature and another one with configurable token lifetime feature. Microsoft plans to retire the configurable token lifetime feature on November 1 and replace it with the conditional access authentication session management feature.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/expensein-tutorial.md
+28-18Lines changed: 28 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.workload: identity
14
14
ms.tgt_pltfrm: na
15
15
ms.devlang: na
16
16
ms.topic: tutorial
17
-
ms.date: 05/31/2019
17
+
ms.date: 06/11/2019
18
18
ms.author: jeedes
19
19
20
20
ms.collection: M365-identity-device-management
@@ -54,15 +54,15 @@ To configure the integration of ExpenseIn into Azure AD, you need to add Expense
54
54
55
55
## Configure and test Azure AD single sign-on
56
56
57
-
Configure and test Azure AD SSO with ExpenseIn using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in ExpenseIn.
57
+
Configure and test Azure AD SSO with ExpenseIn using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in ExpenseIn.
58
58
59
59
To configure and test Azure AD SSO with ExpenseIn, complete the following building blocks:
60
60
61
61
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** to enable your users to use this feature.
62
62
2.**[Configure ExpenseIn](#configure-expensein)** to configure the SSO settings on application side.
63
-
3.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B.Simon.
64
-
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B.Simon to use Azure AD single sign-on.
65
-
5.**[Create ExpenseIn test user](#create-expensein-test-user)** to have a counterpart of B.Simon in ExpenseIn that is linked to the Azure AD representation of user.
63
+
3.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** to test Azure AD single sign-on with B.Simon.
64
+
4.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** to enable B.Simon to use Azure AD single sign-on.
65
+
5.**[Create ExpenseIn test user](#create-expensein-test-user)** to have a counterpart of B.Simon in ExpenseIn that is linked to the Azure AD representation of user.
66
66
6.**[Test SSO](#test-sso)** to verify whether the configuration works.
67
67
68
68
### Configure Azure AD SSO
@@ -99,41 +99,51 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
99
99
100
100
### Configure ExpenseIn
101
101
102
-
1.In a different web browser window, sign in to ExpenseIn as an Administrator.
102
+
1.To automate the configuration within ExpenseIn, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
103
103
104
-
2. Click on **Admin** on the top of the page then navigate to **Single Sign-On** and click **Add provider**.
2. After adding extension to the browser, click on **Setup ExpenseIn** will direct you to the ExpenseIn application. From there, provide the admin credentials to sign into ExpenseIn. The browser extension will automatically configure the application for you and automate steps 3-5.
107
+
108
+

109
+
110
+
3. If you want to setup ExpenseIn manually, open a new web browser window and sign into your ExpenseIn company site as an administrator and perform the following steps:
111
+
112
+
4. Click on **Admin** on the top of the page then navigate to **Single Sign-On** and click **Add provider**.
a. In the **Provider Name** text box, type the name like ex:Azure.
113
121
114
-
b. In the **Target Url** text box, paste the value of **Login URL**, which you have copied from Azure portal.
122
+
b. Select **Yes** as **Allow Provider Intitated Sign-On**.
123
+
124
+
c. In the **Target Url** text box, paste the value of **Login URL**, which you have copied from Azure portal.
115
125
116
-
c. In the **Issuer** text box, paste the value of **Azure AD Identifier**, which you have copied from Azure portal.
126
+
d. In the **Issuer** text box, paste the value of **Azure AD Identifier**, which you have copied from Azure portal.
117
127
118
-
d. Open the Certificate (Base64) in Notepad, copy its content and paste it in the **Certificate** text box.
128
+
e. Open the Certificate (Base64) in Notepad, copy its content and paste it in the **Certificate** text box.
119
129
120
-
e. Click **Create**.
130
+
f. Click **Create**.
121
131
122
132
### Create an Azure AD test user
123
133
124
-
In this section, you'll create a test user in the Azure portal called B.Simon.
134
+
In this section, you'll create a test user in the Azure portal called B.Simon.
125
135
126
136
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
127
137
1. Select **New user** at the top of the screen.
128
138
1. In the **User** properties, follow these steps:
129
-
1. In the **Name** field, enter `B.Simon`.
130
-
1. In the **User name** field, enter the [email protected]. For example, `BrittaSimon@contoso.com`.
139
+
1. In the **Name** field, enter `B.Simon`.
140
+
1. In the **User name** field, enter the [email protected]. For example, `B.Simon@contoso.com`.
131
141
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
132
142
1. Click **Create**.
133
143
134
144
### Assign the Azure AD test user
135
145
136
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to ExpenseIn.
146
+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to ExpenseIn.
137
147
138
148
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
139
149
1. In the applications list, select **ExpenseIn**.
@@ -145,7 +155,7 @@ In this section, you'll enable B. Simon to use Azure single sign-on by granting
145
155
146
156

147
157
148
-
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
158
+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
149
159
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
150
160
1. In the **Add Assignment** dialog, click the **Assign** button.
151
161
@@ -169,7 +179,7 @@ To enable Azure AD users to sign in to ExpenseIn, they must be provisioned into
169
179
170
180
b. In **Last Name** text box, enter the last name of user like **Simon**.
171
181
172
-
c. In **Email** text box, enter the email of user like `B.[email protected]`.
182
+
c. In **Email** text box, enter the email of user like `[email protected]`.
You can also configure additional parameters for `kured`, such as integration with Prometheus or Slack. For more information about additional configuration parameters, see the [kured installation docs][kured-install].
Copy file name to clipboardExpand all lines: articles/api-management/api-management-cross-domain-policies.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -140,7 +140,7 @@ This example demonstrates how to support pre-flight requests, such as those with
140
140
This policy can be used in the following policy [sections](https://azure.microsoft.com/documentation/articles/api-management-howto-policies/#sections) and [scopes](https://azure.microsoft.com/documentation/articles/api-management-howto-policies/#scopes).
The `jsonp` policy adds JSON with padding (JSONP) support to an operation or an API to allow cross-domain calls from JavaScript browser-based clients. JSONP is a method used in JavaScript programs to request data from a server in a different domain. JSONP bypasses the limitation enforced by most web browsers where access to web pages must be in the same domain.
Copy file name to clipboardExpand all lines: articles/app-service/app-service-hybrid-connections.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.workload: na
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: na
15
15
ms.topic: article
16
-
ms.date: 07/26/2018
16
+
ms.date: 06/06/2019
17
17
ms.author: ccompy
18
18
ms.custom: seodec18
19
19
@@ -39,7 +39,6 @@ When your app makes a DNS request that matches a configured Hybrid Connection en
39
39
> This means that you should try to always use a DNS name for your Hybrid Connection. Some client software does not do a DNS lookup if the endpoint uses an IP address instead.
40
40
>
41
41
42
-
43
42
### App Service Hybrid Connection benefits ###
44
43
45
44
There are a number of benefits to the Hybrid Connections capability, including:
@@ -137,7 +136,7 @@ To add one or more Hybrid Connections to your HCM:
137
136
2. Select **Configure another Hybrid Connection**.
138
137
![Screenshot of Configure New Hybrid Connections][8]
139
138
140
-
1. Sign in with your Azure account.
139
+
1. Sign in with your Azure account to get your Hybrid Connections available with your subscriptions. The HCM does not continue to use your Azure account beyond that.
141
140
1. Choose a subscription.
142
141
1. Select the Hybrid Connections that you want the HCM to relay.
143
142
![Screenshot of Hybrid Connections][9]
@@ -224,7 +223,9 @@ The status of "Connected" means that at least one HCM is configured with that Hy
224
223
225
224
The primary reason that clients cannot connect to their endpoint is because the endpoint was specified by using an IP address instead of a DNS name. If your app cannot reach the desired endpoint and you used an IP address, switch to using a DNS name that is valid on the host where the HCM is running. Also check that the DNS name resolves properly on the host where the HCM is running. Confirm that there is connectivity from the host where the HCM is running to the Hybrid Connection endpoint.
226
225
227
-
In App Service, the tcpping tool can be invoked from the Advanced Tools (Kudu) console. This tool can tell you if you have access to a TCP endpoint, but it does not tell you if you have access to a Hybrid Connection endpoint. When you use the tool in the console against a Hybrid Connection endpoint, you are only confirming that it uses a host:port combination.
226
+
In App Service, the **tcpping** command line tool can be invoked from the Advanced Tools (Kudu) console. This tool can tell you if you have access to a TCP endpoint, but it does not tell you if you have access to a Hybrid Connection endpoint. When you use the tool in the console against a Hybrid Connection endpoint, you are only confirming that it uses a host:port combination.
227
+
228
+
If you have a command line client for your endpoint, you can test connectivity from the app console. For example, you can test access to web server endpoints by using curl.
Copy file name to clipboardExpand all lines: articles/app-service/app-service-ip-restrictions.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.workload: web
13
13
ms.tgt_pltfrm: na
14
14
ms.devlang: multiple
15
15
ms.topic: article
16
-
ms.date: 05/28/2019
16
+
ms.date: 06/06/2019
17
17
ms.author: ccompy
18
18
ms.custom: seodec18
19
19
@@ -44,27 +44,27 @@ From the Access Restrictions UI, you can review the list of access restriction r
44
44
45
45
The list will show all of the current restrictions that are on your app. If you have a VNet restriction on your app, the table will show if service endpoints are enabled for Microsoft.Web. When there are no defined restrictions on your app, your app will be accessible from anywhere.
46
46
47
+
## Adding IP address rules
48
+
47
49
You can click on **[+] Add** to add a new access restriction rule. Once you add a rule, it will become effective immediately. Rules are enforced in priority order starting from the lowest number and going up. There is an implicit deny all that is in effect once you add even a single rule.
48
50
49
-
### Adding IP address rules
51
+
When creating a rule, you must select allow/deny and also the type of rule. You are also required to provide the priority value and what you are restricting access to. You can optionally add a name, and description to the rule.
50
52
51
53

52
54
53
-
When creating a rule, you must select allow/deny and also the type of rule. You are also required to provide the priority value and what you are restricting access to. You can optionally add a name, and description to the rule.
54
-
55
55
To set an IP address based rule, select a type of IPv4 or IPv6. IP Address notation must be specified in CIDR notation for both IPv4 and IPv6 addresses. To specify an exact address, you can use something like 1.2.3.4/32 where the first four octets represent your IP address and /32 is the mask. The IPv4 CIDR notation for all addresses is 0.0.0.0/0. To learn more about CIDR notation, you can read [Classless Inter-Domain Routing](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing).
56
56
57
-
###Service endpoints
57
+
## Service endpoints
58
58
59
-

59
+
Service endpoints enables you to restrict access to selected Azure virtual network subnets. To restrict access to a specific subnet, create a restriction rule with a type of Virtual Network. You can pick the subscription, VNet, and subnet you wish to allow or deny access with. If service endpoints are not already enabled with Microsoft.Web for the subnet that you selected, it will automatically be enabled for you unless you check the box asking not to do that. The situation where you would want to enable it on the app but not the subnet is largely related to if you have the permissions to enable service endpoints on the subnet or not. If you need to get somebody else to enable service endpoints on the subnet, you can check the box and have your app configured for service endpoints in anticipation of it being enabled later on the subnet.
60
60
61
-
To restrict access to selected subnets, select a type of Virtual Network. Below that you will be able to pick the subscription, VNet, and subnet you wish to allow or deny access with. If service endpoints are not already enabled with Microsoft.Web for the subnet that you selected, it will automatically be enabled for you unless you check the box asking not to do that. The situation where you would want to enable it on the app but not the subnet is largely related to if you have the permissions to enable service endpoints on the subnet or not. If you need to get somebody else to enable service endpoints on the subnet, you can check the box and have your app configured for service endpoints in anticipation of it being enabled later on the subnet.
61
+

62
62
63
63
Service endpoints cannot be used to restrict access to apps that run in an App Service Environment. When your app is in an App Service Environment, you can control access to your app with IP access rules.
64
64
65
65
With service endpoints, you can configure your app with Application Gateways or other WAF devices. You can also configure multi-tier applications with secure backends. For more details on some of the possibilities, read [Networking features and App Service](networking-features.md).
66
66
67
-
###Managing access restriction rules
67
+
## Managing access restriction rules
68
68
69
69
You can click on any row to edit an existing access restriction rule. Edits are effective immediately including changes in priority ordering.
70
70
@@ -78,15 +78,15 @@ To delete a rule, click the **...** on your rule and then click **remove**.
When adding your first IP Restriction rule, the service will add an explicit **deny all** rule with a priority of 2147483647. In practice, the explicit **deny all** rule will be last rule executed and will block access to any IP address that is not explicitly allowed using an **Allow** rule.
84
84
85
85
For the scenario where users want to explicitly block a single IP address or IP address block, but allow everything else access, it is necessary to add an explicit **Allow All** rule.
86
86
87
87

88
88
89
-
###SCM site
89
+
## SCM site
90
90
91
91
In addition to being able to control access to your app, you can also restrict access to the scm site used by your app. The scm site is the web deploy endpoint and also the Kudu console. You can separately assign access restrictions to the scm site from the app or use the same set for both the app and the scm site. When you check the box to have the same restrictions as your app, everything is blanked out. If you uncheck the box, whatever settings you had earlier on the scm site are applied.
0 commit comments