Skip to content

Commit 0264f3c

Browse files
committed
Merge branch 'main' into release-ga-virtual-network-manager
2 parents 1524ecc + 8d60b89 commit 0264f3c

File tree

213 files changed

+3901
-1570
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

213 files changed

+3901
-1570
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,11 @@
9595
"redirect_url": "/graph/tutorial-lifecycle-workflows-onboard-custom-workflow",
9696
"redirect_document_id": false
9797
},
98+
{
99+
"source_path_from_root": "/articles/active-directory/governance/manage-lifecycle-workflows.md",
100+
"redirect_url": "/azure/active-directory/governance/understanding-lifecycle-workflows",
101+
"redirect_document_id": false
102+
},
98103
{
99104
"source_path_from_root": "/articles/active-directory/governance/lifecycle-workflows-developer-reference.md",
100105
"redirect_url": "/graph/api/resources/identitygovernance-workflow",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22440,6 +22440,11 @@
2244022440
"source_path": "articles/private-multi-access-edge-compute-mec/metaswitch-fusion-core-overview.md",
2244122441
"redirect_URL": "/azure/private-5g-core",
2244222442
"redirect_document_id": false
22443+
},
22444+
{
22445+
"source_path": "articles/communications-gateway/rotate-secrets.md",
22446+
"redirect_URL": "/azure/communications-gateway/whats-new",
22447+
"redirect_document_id": false
2244322448
}
2244422449
]
2244522450
}

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,3 +64,4 @@ The following video provides an overview of on-premises provisoning.
6464
- [App provisioning](user-provisioning.md)
6565
- [Generic SQL connector](on-premises-sql-connector-configure.md)
6666
- [Tutorial: ECMA Connector Host generic SQL connector](tutorial-ecma-sql-connector.md)
67+
- [Known issues](known-issues.md)

articles/active-directory/app-provisioning/scim-validator-tutorial.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 09/13/2022
11+
ms.date: 03/17/2023
1212
ms.custom: template-tutorial
1313
ms.reviewer: arvinh
1414
---
@@ -41,7 +41,7 @@ The first step is to select a testing method to validate your SCIM endpoint.
4141

4242
**Use default attributes** - The system provides the default attributes, and you modify them to meet your need.
4343

44-
**Discover schema** - If your end point supports /Schema, this option will allow the tool to discover the supported attributes. We recommend this option as it reduces the overhead of updating your app as you build it out.
44+
**Discover schema** - If your end point supports /Schema, this option lets the tool discover the supported attributes. We recommend this option as it reduces the overhead of updating your app as you build it out.
4545

4646
**Upload Azure AD Schema** - Upload the schema you've downloaded from your sample app on Azure AD.
4747

@@ -75,7 +75,7 @@ Finally, you need to test and validate your endpoint.
7575

7676
### Use Postman to test endpoints (optional)
7777

78-
In addition to using the SCIM Validator tool, you can also use Postman to validate an endpoint. This example provides a set of tests in Postman that validate CRUD (create, read, update, and delete) operations on users and groups, filtering, updates to group membership, and disabling users.
78+
In addition to using the SCIM Validator tool, you can also use Postman to validate an endpoint. This example provides a set of tests in Postman. The example validates create, read, update, and delete (CRUD) operations. The operations are validated on users and groups, filtering, updates to group membership, and disabling users.
7979

8080
The endpoints are in the `{host}/scim/` directory, and you can use standard HTTP requests to interact with them. To modify the `/scim/` route, see *ControllerConstant.cs* in **AzureADProvisioningSCIMreference** > **ScimReferenceApi** > **Controllers**.
8181

@@ -120,10 +120,10 @@ If you created any Azure resources in your testing that are no longer needed, do
120120
## Known Issues with Azure AD SCIM Validator
121121

122122
- Soft deletes (disables) aren’t yet supported.
123-
- The time zone format is randomly generated and will fail for systems that try to validate it.
124-
- The preferred language format is randomly generated and will fail for systems that try to validate it.
123+
- The time zone format is randomly generated and fails for systems that try to validate it.
124+
- The preferred language format is randomly generated and fails for systems that try to validate it.
125125
- The patch user remove attributes may attempt to remove mandatory/required attributes for certain systems. Such failures should be ignored.
126126

127127

128128
## Next steps
129-
- [Learn how to add an app that is not in the Azure AD app gallery](../manage-apps/overview-application-gallery.md)
129+
- [Learn how to add an app that's not in the Azure AD app gallery](../manage-apps/overview-application-gallery.md)

articles/active-directory/app-provisioning/use-scim-to-build-users-and-groups-endpoints.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 03/16/2023
11+
ms.date: 03/17/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -102,7 +102,7 @@ That's it! Your SCIM endpoint is now published, and you can use the Azure App Se
102102
103103
## Test your SCIM endpoint
104104
105-
Requests to a SCIM endpoint require authorization. The SCIM standard has multiple options for authentication and authorization, including cookies, basic authentication, TLS client authentication, or any of the methods listed in [RFC 7644](https://tools.ietf.org/html/rfc7644#section-2).
105+
Requests to a SCIM endpoint require authorization. The SCIM standard has multiple options available. Requests can use cookies, basic authentication, TLS client authentication, or any of the methods listed in [RFC 7644](https://tools.ietf.org/html/rfc7644#section-2).
106106
107107
Be sure to avoid methods that aren't secure, such as username and password, in favor of a more secure method such as OAuth. Azure AD supports long-lived bearer tokens (for gallery and non-gallery applications) and the OAuth authorization grant (for gallery applications).
108108

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/16/2023
11+
ms.date: 03/17/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,8 @@
137137
href: active-directory-jwt-claims-customization.md
138138
- name: Customize SAML claims
139139
href: active-directory-saml-claims-customization.md
140+
- name: Set an access token lifetime policy
141+
href: registration-config-change-token-lifetime-how-to.md
140142
- name: Directory extension attributes
141143
href: active-directory-schema-extensions.md
142144
- name: SAML app multi-instancing

articles/active-directory/develop/active-directory-configurable-token-lifetimes.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -58,10 +58,10 @@ ID tokens are passed to websites and native clients. ID tokens contain profile i
5858

5959
## Token lifetime policies for refresh tokens and session tokens
6060

61-
You can not set token lifetime policies for refresh tokens and session tokens. For lifetime, timeout, and revocation information on refresh tokens, see [Refresh tokens](refresh-tokens.md).
61+
You cannot set token lifetime policies for refresh tokens and session tokens. For lifetime, timeout, and revocation information on refresh tokens, see [Refresh tokens](refresh-tokens.md).
6262

6363
> [!IMPORTANT]
64-
> As of January 30, 2021 you can not configure refresh and session token lifetimes. Azure Active Directory no longer honors refresh and session token configuration in existing policies. New tokens issued after existing tokens have expired are now set to the [default configuration](#configurable-token-lifetime-properties). You can still configure access, SAML, and ID token lifetimes after the refresh and session token configuration retirement.
64+
> As of January 30, 2021 you cannot configure refresh and session token lifetimes. Azure Active Directory no longer honors refresh and session token configuration in existing policies. New tokens issued after existing tokens have expired are now set to the [default configuration](#configurable-token-lifetime-properties). You can still configure access, SAML, and ID token lifetimes after the refresh and session token configuration retirement.
6565
>
6666
> Existing token's lifetime will not be changed. After they expire, a new token will be issued based on the default value.
6767
>
@@ -74,7 +74,7 @@ A token lifetime policy is a type of policy object that contains token lifetime
7474

7575
Reducing the Access Token Lifetime property mitigates the risk of an access token or ID token being used by a malicious actor for an extended period of time. (These tokens cannot be revoked.) The trade-off is that performance is adversely affected, because the tokens have to be replaced more often.
7676

77-
For an example, see [Create a policy for web sign-in](configure-token-lifetimes.md#create-a-policy-for-web-sign-in).
77+
For an example, see [Create a policy for web sign-in](registration-config-change-token-lifetime-how-to.md).
7878

7979
Access, ID, and SAML2 token configuration are affected by the following properties and their respectively set values:
8080

@@ -99,7 +99,7 @@ Refresh and session token configuration are affected by the following properties
9999
|Single-Factor Session Token Max Age |MaxAgeSessionSingleFactor |Session tokens (persistent and nonpersistent) |Until-revoked |
100100
|Multi-Factor Session Token Max Age |MaxAgeSessionMultiFactor |Session tokens (persistent and nonpersistent) |Until-revoked |
101101

102-
Non-persistent session tokens have a Max Inactive Time of 24 hours whereas persistent session tokens have a Max Inactive Time of 90 days. Anytime the SSO session token is used within its validity period, the validity period is extended another 24 hours or 90 days. If the SSO session token isn't used within its Max Inactive Time period, it's considered expired and will no longer be accepted. Any changes to this default periods should be change using [Conditional Access](../conditional-access/howto-conditional-access-session-lifetime.md).
102+
Non-persistent session tokens have a Max Inactive Time of 24 hours whereas persistent session tokens have a Max Inactive Time of 90 days. Anytime the SSO session token is used within its validity period, the validity period is extended another 24 hours or 90 days. If the SSO session token isn't used within its Max Inactive Time period, it's considered expired and will no longer be accepted. Any changes to this default period should be changed using [Conditional Access](../conditional-access/howto-conditional-access-session-lifetime.md).
103103

104104
You can use PowerShell to find the policies that will be affected by the retirement. Use the [PowerShell cmdlets](configure-token-lifetimes.md#get-started) to see the all policies created in your organization, or to find which apps and service principals are linked to a specific policy.
105105

0 commit comments

Comments
 (0)