Skip to content

Commit 09663ff

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into cni-rework
2 parents a49be8c + 33a3b73 commit 09663ff

File tree

237 files changed

+794
-643
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

237 files changed

+794
-643
lines changed

articles/active-directory-b2c/deploy-custom-policies-github-action.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ For the GitHub Action to access data in Microsoft Graph, grant the registered ap
4848

4949
GitHub secrets are encrypted environment variables that you create in an organization, repository, or repository environment. In this step, you store the application secret for the application you registered earlier in the [Register an MS Graph application](#register-a-microsoft-graph-application) step.
5050

51-
The GitHub Action for deploying Azure AD B2C custom policies uses the secret to acquire an access token that is used to interact with the Microsoft Graph API. For more information, see [Creating encrypted secrets for a repository](https://docs.github.com/en/actions/security-guides/using-secrets-in-github-actions#creating-encrypted-secrets-for-a-repository).
51+
The GitHub Action for deploying Azure AD B2C custom policies uses the secret to acquire an access token that is used to interact with the Microsoft Graph API. For more information, see [Creating encrypted secrets for a repository](https://docs.github.com/actions/security-guides/using-secrets-in-github-actions#creating-encrypted-secrets-for-a-repository).
5252

5353
To create a GitHub secret, follow these steps:
5454

@@ -141,9 +141,9 @@ To test the workflow you created, **Push** the changes of your custom policy. On
141141

142142
## Optional: Schedule your workflow
143143

144-
The workflow you created is triggered by the [push](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#push) event. If you prefer, you can choose another event to trigger the workflow, for example a [pull request](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#pull_request).
144+
The workflow you created is triggered by the [push](https://docs.github.com/actions/using-workflows/events-that-trigger-workflows#push) event. If you prefer, you can choose another event to trigger the workflow, for example a [pull request](https://docs.github.com/actions/using-workflows/events-that-trigger-workflows#pull_request).
145145

146-
You can also schedule a workflow to run at specific UTC times using [POSIX cron syntax](https://pubs.opengroup.org/onlinepubs/9699919799/utilities/crontab.html#tag_20_25_07). The schedule event allows you to trigger a workflow at a scheduled time. For more information, see [Scheduled events](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows#scheduled-events).
146+
You can also schedule a workflow to run at specific UTC times using [POSIX cron syntax](https://pubs.opengroup.org/onlinepubs/9699919799/utilities/crontab.html#tag_20_25_07). The schedule event allows you to trigger a workflow at a scheduled time. For more information, see [Scheduled events](https://docs.github.com/actions/using-workflows/events-that-trigger-workflows#scheduled-events).
147147

148148
The following example triggers the workflow every day at 5:30 and 17:30 UTC:
149149

@@ -170,4 +170,4 @@ To edit your workflow:
170170

171171
## Next steps
172172

173-
- Learn how to configure [Events that trigger workflows](https://docs.github.com/en/actions/using-workflows/events-that-trigger-workflows)
173+
- Learn how to configure [Events that trigger workflows](https://docs.github.com/actions/using-workflows/events-that-trigger-workflows)

articles/active-directory-b2c/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -217,10 +217,10 @@ conceptualContent:
217217
url: custom-domain.md
218218
itemType: how-to-guide
219219
- text: Customize user experiences using custom policies
220-
url: add-sign-up-and-sign-in-policy.md?pivots=b2c-custom-policy
220+
url: add-sign-up-and-sign-in-policy.md?pivots=b2c-custom-policy
221221
itemType: how-to-guide
222222
- text: Custom policy how-to guide series
223-
url: custom-policies-series-overview.md
223+
url: custom-policies-series-overview.md
224224
itemType: how-to-guide
225225
# - text: Use API connectors
226226
# url: add-api-connector.md?pivots=b2c-user-flow

articles/active-directory/app-provisioning/insufficient-access-rights-error-troubleshooting.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,4 +110,3 @@ You can set the registry option to [skip GMSA configuration](https://go.microsof
110110
## Next steps
111111

112112
* [Learn more about the Inbound Provisioning API](inbound-provisioning-api-concepts.md)
113-

articles/active-directory/app-proxy/application-proxy-back-end-kerberos-constrained-delegation-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 11/17/2022
11+
ms.date: 09/14/2023
1212
ms.author: kenwith
1313
ms.reviewer: asteen, ashishj
1414
---

articles/active-directory/app-proxy/application-proxy-config-how-to.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 11/17/2022
11+
ms.date: 09/14/2023
1212
ms.author: kenwith
1313
ms.reviewer: asteen
1414
---

articles/active-directory/app-proxy/application-proxy-config-problem.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: troubleshooting
11-
ms.date: 11/17/2022
11+
ms.date: 09/14/2023
1212
ms.author: kenwith
1313
ms.reviewer: asteen
1414
---

articles/active-directory/app-proxy/application-proxy-config-sso-how-to.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 11/17/2022
11+
ms.date: 09/14/2023
1212
ms.author: kenwith
1313
ms.reviewer: ashishj, asteen
1414
---
@@ -18,7 +18,13 @@ ms.reviewer: ashishj, asteen
1818
Single sign-on (SSO) allows your users to access an application without authenticating multiple times. It allows the single authentication to occur in the cloud, against Azure Active Directory, and allows the service or Connector to impersonate the user to complete any additional authentication challenges from the application.
1919

2020
## How to configure single-sign on
21-
To configure SSO, first make sure that your application is configured for Pre-Authentication through Azure Active Directory. To do this configuration, go to **Azure Active Directory** -> **Enterprise Applications** -> **All Applications** -> Your application **-> Application Proxy**. On this page, you see the “Pre Authentication” field, and make sure that is set to “Azure Active Directory.
21+
To configure SSO, first make sure that your application is configured for Pre-Authentication through Azure Active Directory.
22+
23+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
24+
1. Select your username in the upper-right corner. Verify you're signed in to a directory that uses Application Proxy. If you need to change directories, select **Switch directory** and choose a directory that uses Application Proxy.
25+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
26+
27+
Look for the “Pre Authentication” field, and make sure that is set.
2228

2329
For more information on the Pre-Authentication methods, see step 4 of the [app publishing document](application-proxy-add-on-premises-application.md).
2430

articles/active-directory/app-proxy/application-proxy-configure-connectors-with-proxy-servers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 04/04/2022
11+
ms.date: 09/14/2023
1212
ms.author: kenwith
1313
ms.reviewer: ashishj
1414
---

articles/active-directory/app-proxy/application-proxy-configure-cookie-settings.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.custom: has-azure-ad-ps-ref
1111
ms.topic: how-to
12-
ms.date: 11/17/2022
12+
ms.date: 09/14/2023
1313
ms.author: kenwith
1414
ms.reviewer: ashishj
1515
---
@@ -46,10 +46,8 @@ Additionally, if your back-end application has cookies that need to be available
4646

4747
To set the cookie settings using the Azure portal:
4848

49-
1. Sign in to the [Azure portal](https://portal.azure.com).
50-
2. Navigate to **Azure Active Directory** > **Enterprise applications** > **All applications**.
51-
3. Select the application for which you want to enable a cookie setting.
52-
4. Click **Application Proxy**.
49+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Application Administrator](../roles/permissions-reference.md#application-administrator).
50+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
5351
5. Under **Additional Settings**, set the cookie setting to **Yes** or **No**.
5452
6. Click **Save** to apply your changes.
5553

articles/active-directory/app-proxy/application-proxy-configure-custom-domain.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-proxy
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 11/17/2022
11+
ms.date: 09/14/2023
1212
ms.author: kenwith
1313
ms.reviewer: ashishj
1414
---
@@ -59,8 +59,9 @@ To configure an on-premises app to use a custom domain, you need a verified Azur
5959
### Create and verify a custom domain
6060

6161
To create and verify a custom domain:
62-
63-
1. In Azure Active Directory, select **Custom domain names** in the left navigation, and then select **Add custom domain**.
62+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com).
63+
1. Browse to **Identity** > **Settings** > **Domain names**.
64+
1. Select **Add custom domain**.
6465
1. Enter your custom domain name and select **Add Domain**.
6566
1. On the domain page, copy the TXT record information for your domain.
6667
1. Go to your domain registrar and create a new TXT record for your domain, based on your copied DNS information.
@@ -72,7 +73,8 @@ For more detailed instructions, see [Add your custom domain name using the Azure
7273

7374
To publish your app through Application Proxy with a custom domain:
7475

75-
1. For a new app, in Azure Active Directory, select **Enterprise applications** in the left navigation. Select **New application**. In the **On-premises applications** section, select **Add an on-premises application**.
76+
1. For a new app, in the Microsoft Entra admin center, browse to **Identity** > **Applications** > **Enterprise applications** > **Application proxy**.
77+
1. Select **New application**. In the **On-premises applications** section, select **Add an on-premises application**.
7678

7779
For an app already in **Enterprise applications**, select it from the list, and then select **Application proxy** in the left navigation.
7880

0 commit comments

Comments
 (0)