Skip to content

Commit 0a85a12

Browse files
authored
Merge pull request #196140 from MicrosoftDocs/main
4/26 AM Publish
2 parents 7478626 + d3ce925 commit 0a85a12

File tree

44 files changed

+348
-260
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+348
-260
lines changed

articles/active-directory-b2c/social-transformations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,10 @@ ms.subservice: B2C
1616

1717
# Social accounts claims transformations
1818

19-
In Azure Active Directory B2C (Azure AD B2C), social account identities are stored in a `userIdentities` attribute of a **alternativeSecurityIdCollection** claim type. Each item in the **alternativeSecurityIdCollection** specifies the issuer (identity provider name, such as facebook.com) and the `issuerUserId`, which is a unique user identifier for the issuer.
19+
In Azure Active Directory B2C (Azure AD B2C), social account identities are stored in a `alternativeSecurityIds` attribute of a **alternativeSecurityIdCollection** claim type. Each item in the **alternativeSecurityIdCollection** specifies the issuer (identity provider name, such as facebook.com) and the `issuerUserId`, which is a unique user identifier for the issuer.
2020

2121
```json
22-
"userIdentities": [{
22+
"alternativeSecurityIds": [{
2323
"issuer": "google.com",
2424
"issuerUserId": "MTA4MTQ2MDgyOTI3MDUyNTYzMjcw"
2525
},

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -229,6 +229,12 @@ For the next test scenario, configure the authentication policy where the **poli
229229

230230
- The **Additional Details** tab shows **User certificate subject name** as the attribute name but it is actually "User certificate binding identifier". It is the value of the certificate field that username binding is configured to use.
231231

232+
- There is a double prompt for iOS because iOS only supports pushing certificates to a device storage. When an organization pushes user certificates to an iOS device through Mobile Device Management (MDM) or when a user accesses first-party or native apps, there is no access to device storage. Only Safari can access device storage.
233+
234+
When an iOS client sees a client TLS challenge and the user clicks **Sign in with certificate**, iOS client knows it cannot handle it and sends a completely new authorization request using the Safari browser. The user clicks **Sign in with certificate** again, at which point Safari which has access to certificates for authentication in device storage. This requires users to click **Sign in with certificate** twice, once in app’s WKWebView and once in Safari’s System WebView.
235+
236+
We are aware of the UX experience issue and are working to fix this on iOS and to have a seamless UX experience.
237+
232238
## Next steps
233239

234240
- [Overview of Azure AD CBA](concept-certificate-based-authentication.md)

articles/active-directory/authentication/how-to-migrate-mfa-server-to-azure-mfa-with-federation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Step-by-step guidance to move from Azure MFA Server on-premises to
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: how-to
7-
ms.date: 04/07/2022
7+
ms.date: 04/21/2022
88
ms.author: BaSelden
99
author: BarbaraSelden
1010
manager: martinco
@@ -174,7 +174,7 @@ This section covers final steps before migrating user phone numbers.
174174

175175
### Set federatedIdpMfaBehavior to enforceMfaByFederatedIdp
176176

177-
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain has a Microsoft Graph PowerShell security setting named **federatedIdpMfaBehavior**. You can set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` so Azure AD accepts MFA that's performed by the federated identity provider. If the federated identity provider didn't perform MFA, Azure AD redirects the request to the federated identity provider to perform MFA. For more information, see [federatedIdpMfaBehavior](/graph/api/resources/federatedIdpMfaBehavior?view=graph-rest-beta&preserve-view=true).
177+
For federated domains, MFA may be enforced by Azure AD Conditional Access or by the on-premises federation provider. Each federated domain has a Microsoft Graph PowerShell security setting named **federatedIdpMfaBehavior**. You can set **federatedIdpMfaBehavior** to `enforceMfaByFederatedIdp` so Azure AD accepts MFA that's performed by the federated identity provider. If the federated identity provider didn't perform MFA, Azure AD redirects the request to the federated identity provider to perform MFA. For more information, see [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values).
178178

179179
>[!NOTE]
180180
> The **federatedIdpMfaBehavior** setting is an evolved version of the **SupportsMfa** property of the [Set-MsolDomainFederationSettings MSOnline v1 PowerShell cmdlet](/powershell/module/msonline/set-msoldomainfederationsettings).
Loading

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-issuer.md

Lines changed: 4 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: barclayn
77
manager: karenhoran
88
ms.author: barclayn
99
ms.topic: tutorial
10-
ms.date: 10/08/2021
10+
ms.date: 04/26/2022
1111
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
1212

1313
---
@@ -46,7 +46,7 @@ The following diagram illustrates the Azure AD Verifiable Credentials architectu
4646

4747
## Create a storage account
4848

49-
Azure Blob Storage is an object storage solution for the cloud. Azure AD Verifiable Credentials uses [Azure Blob Storage](../../storage/blobs/storage-blobs-introduction.md) to store the configuration files when the service is issuing verifiable credentials.
49+
Azure Blob Storage is an object storage solution for the cloud. Azure AD Verifiable Credentials use [Azure Blob Storage](../../storage/blobs/storage-blobs-introduction.md) to store the configuration files when the service is issuing verifiable credentials.
5050

5151
Create and configure Blob Storage by following these steps:
5252

@@ -59,36 +59,9 @@ Create and configure Blob Storage by following these steps:
5959

6060
![Screenshot that shows how to create a container.](media/verifiable-credentials-configure-issuer/create-container.png)
6161

62-
## Grant access to the container
63-
64-
After you create your container, grant the signed-in user the correct role assignment so they can access the files in Blob Storage.
65-
66-
1. From the list of containers, select **vc-container**.
67-
68-
1. From the menu, select **Access Control (IAM)**.
69-
70-
1. Select **+ Add,** and then select **Add role assignment**.
71-
72-
![Screenshot that shows how to add a new role assignment to the blob container.](media/verifiable-credentials-configure-issuer/add-role-assignment.png)
73-
74-
1. In **Add role assignment**:
75-
76-
1. For the **Role**, select **Storage Blob Data Reader**.
77-
78-
1. For the **Assign access to**, select **User, group, or service
79-
principal**.
80-
81-
1. Then, search the account that you're using to perform these steps, and
82-
select it.
83-
84-
![Screenshot that shows how to set up the new role assignment.](media/verifiable-credentials-configure-issuer/add-role-assignment-container.png)
85-
86-
>[!IMPORTANT]
87-
>By default, container creators get the owner role assigned. The owner role isn't enough on its own. Your account needs the storage blob data reader role. For more information, see [Use the Azure portal to assign an Azure role for access to blob and queue data](../../storage/blobs/assign-azure-role-data-access.md).
88-
8962
### Upload the configuration files
9063

91-
Azure AD Verifiable Credentials uses two JSON configuration files, the rules file and the display file.
64+
Azure AD Verifiable Credentials service uses two JSON configuration files, the rules file and the display file.
9265

9366
- The *rules* file describes important properties of verifiable credentials. In particular, it describes the claims that subjects (users) need to provide before a verifiable credential is issued for them.
9467
- The *display* file controls the branding of the credential and styling of the claims.
@@ -175,7 +148,7 @@ In this step, you create the verified credential expert card by using Azure AD V
175148

176149
1. For **Subscription**, select your Azure AD subscription where you created Blob Storage.
177150

178-
1. Under the **Display file**, select **Select display file**. In the Storage accounts section, select **vc-container**. Then select the **VerifiedCredentialExpertDisplay.json** file and click **Select**.
151+
1. Under the **Display file**, select **Select display file**. In the Storage accounts section, select **vc-container**. Then select the **VerifiedCredentialExpertDisplay.json** file and select **Select**.
179152

180153
1. Under the **Rules file**, **Select rules file**. In the Storage accounts section, select the **vc-container**. Then select the **VerifiedCredentialExpertRules.json** file, and choose **Select**.
181154

articles/active-directory/verifiable-credentials/verifiable-credentials-configure-tenant.md

Lines changed: 7 additions & 65 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: barclayn
77
manager: karenhoran
88
ms.author: barclayn
99
ms.topic: tutorial
10-
ms.date: 02/24/2022
10+
ms.date: 04/26/2022
1111
# Customer intent: As an enterprise, we want to enable customers to manage information about themselves by using verifiable credentials.
1212

1313
---
@@ -22,10 +22,10 @@ Specifically, you learn how to:
2222

2323
> [!div class="checklist"]
2424
>
25-
> - Set up a service principal
26-
> - Create a key vault in Azure Key Vault
27-
> - Register an application in Azure AD
28-
> - Set up the Verifiable Credentials service
25+
> - Set up a service principal.
26+
> - Create an Azure Key Vault instance.
27+
> - Register an application in Azure AD.
28+
> - Set up the Verifiable Credentials service.
2929
3030
The following diagram illustrates the Azure AD Verifiable Credentials architecture and the component you configure.
3131

@@ -35,36 +35,8 @@ See a [video walkthrough](https://www.youtube.com/watch?v=8jqjHjQo-3c) going ove
3535

3636
## Prerequisites
3737

38-
- If you don't have Azure subscription, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
39-
- Sign up for [Azure Active Directory Premium editions](../../active-directory/fundamentals/active-directory-get-started-premium.md)
40-
subscription in your tenant.
38+
- You need an Azure tenant with an active subscription. If you don't have Azure subscription, [create one for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
4139
- Ensure that you have the [global administrator](../../active-directory/roles/permissions-reference.md#global-administrator) permission for the directory you want to configure.
42-
- Ensure that you have [PowerShell](/powershell/scripting/install/installing-powershell) 7.0.6 LTS-x64, PowerShell 7.1.3-x64, or later installed.
43-
44-
## Set up a service principal
45-
46-
Create a service principal for the Request Service API. The service API is the Microsoft service that you use to issue or verify Azure AD Verifiable Credentials.
47-
48-
To create the service principal:
49-
50-
1. Run the following PowerShell commands. These commands install and import the `Az` module. For more information, see [Install the Azure Az PowerShell module](/powershell/azure/install-az-ps#installation).
51-
52-
```powershell
53-
if ((Get-Module -ListAvailable -Name "Az.Accounts") -eq $null) { Install-Module -Name "Az.Accounts" -Scope CurrentUser }
54-
if ((Get-Module -ListAvailable -Name "Az.Resources") -eq $null) { Install-Module "Az.Resources" -Scope CurrentUser }
55-
```
56-
57-
1. Run the following PowerShell command to connect to your Azure AD tenant. Replace \<*your-tenant-ID*> with your [Azure AD tenant ID](../../active-directory/fundamentals/active-directory-how-to-find-tenant.md).
58-
59-
```powershell
60-
Connect-AzAccount -TenantId <your-tenant-ID>
61-
```
62-
63-
1. Run the following command in the same PowerShell session. The `AppId` `bbb94529-53a3-4be5-a069-7eaf2712b826` refers to the Verifiable Credentials Microsoft service.
64-
65-
```powershell
66-
New-AzADServicePrincipal -ApplicationId "bbb94529-53a3-4be5-a069-7eaf2712b826" -DisplayName "Verifiable Credential Request Service"
67-
```
6840

6941
## Create a key vault
7042

@@ -96,36 +68,6 @@ A Key Vault [access policy](../../key-vault/general/assign-access-policy.md) def
9668

9769
1. To save the changes, select **Save**.
9870

99-
### Set access policies for the Verifiable Credentials Issuer and Request services
100-
101-
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Request Service**.
102-
103-
1. In **Add access policy**:
104-
105-
1. For **Key permissions**, select **Get** and **Sign**.
106-
107-
1. For **Select principal**, select **Verifiable Credential Request Service**.
108-
109-
1. Select **Add**.
110-
111-
:::image type="content" source="media/verifiable-credentials-configure-tenant/request-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Issuer Service." :::
112-
113-
The access policies for the Verifiable Credentials Issuer service should be added automatically. If the **Verifiable Credential Issuer Service** doesn't appear in the list of access policies, take the following steps to manually add access policies to the service.
114-
115-
1. Select **+ Add Access Policy** to add permission to the service principal of the **Verifiable Credential Issuer Service**.
116-
117-
1. In **Add access policy**:
118-
119-
1. For **Key permissions**, select **Get** and **Sign**.
120-
121-
1. For **Select principal**, select **Verifiable Credential Issuer Service**.
122-
123-
1. Select **Add**.
124-
125-
:::image type="content" source="media/verifiable-credentials-configure-tenant/issuer-service-key-vault-access-policy.png" alt-text="Screenshot that demonstrates how to add an access policy for the Verifiable Credential Request Service." :::
126-
127-
1. Select **Save** to save the new policy you created.
128-
12971
## Register an application in Azure AD
13072

13173
Azure AD Verifiable Credentials Request Service needs to be able to get access tokens to issue and verify. To get access tokens, register a web application and grant API permission for the API Verifiable Credential Request Service that you set up in the previous step.
@@ -148,7 +90,7 @@ Azure AD Verifiable Credentials Request Service needs to be able to get access t
14890

14991
### Grant permissions to get access tokens
15092

151-
In this step, you grant permissions to the Verifiable Credential Request Service principal created in [step 1](#set-up-a-service-principal).
93+
In this step, you grant permissions to the Verifiable Credential Request Service principal.
15294

15395
To add the required permissions, follow these steps:
15496

0 commit comments

Comments
 (0)