Skip to content

Commit 0e11dc2

Browse files
authored
Merge pull request #249788 from MicrosoftDocs/main
Publish to Live Wednesday 4AM PST, 08/30
2 parents aee537b + 216a96a commit 0e11dc2

File tree

168 files changed

+1746
-1309
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

168 files changed

+1746
-1309
lines changed

articles/active-directory/develop/custom-extension-configure-saml-app.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Source claims from an external store (SAML app)
33
titleSuffix: Microsoft identity platform
44
description: Use a custom claims provider to augment tokens with claims from an external identity system. Configure a SAML app to receive tokens with external claims.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -40,9 +40,11 @@ The following steps are for registering a demo [XRayClaims](https://adfshelp.mic
4040

4141
Add a new, non-gallery SAML application in your tenant:
4242

43-
1. Sign in to the [Azure portal](https://portal.azure.com).
43+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
4444

45-
1. Go to **Azure Active Directory** and then **Enterprise applications**. Select **New application** and then **Create your own application**.
45+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
46+
47+
1. Select **New application** and then **Create your own application**.
4648

4749
1. Add a name for the app. For example, **AzureADClaimsXRay**. Select the **Integrate any other application you don't find in the gallery (Non-gallery)** option and select **Create**.
4850

articles/active-directory/develop/custom-extension-get-started.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Get started with custom claims providers (preview)
33
titleSuffix: Microsoft identity platform
44
description: Learn how to develop and register an Azure Active Directory custom authentication extensions REST API. The custom authentication extension allows you to source claims from a data store that is external to Azure Active Directory.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -157,14 +157,11 @@ The following screenshot demonstrates how to configure the Azure HTTP trigger fu
157157

158158
In this step, you configure a custom authentication extension, which will be used by Azure AD to call your Azure function. The custom authentication extension contains information about your REST API endpoint, the claims that it parses from your REST API, and how to authenticate to your REST API. Follow these steps to register a custom authentication extension:
159159

160-
# [Azure portal](#tab/azure-portal)
160+
# [Microsoft Entra admin center](#tab/entra-admin-center)
161161

162-
1. Sign in to the [Azure portal](https://portal.azure.com).
163-
1. Under **Azure services**, select **Azure Active Directory**.
164-
1. Ensure your user account has the Global Administrator or Application Administrator and Authentication Extensibility Administrator role. Otherwise, learn how to [assign a role](../roles/manage-roles-portal.md).
165-
1. From the menu, select **Enterprise applications**.
166-
1. Under **Manage**, select the **Custom authentication extensions**.
167-
1. Select **Create a custom authentication extension**.
162+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](../roles/permissions-reference.md#application-developer) and [Authentication Administrator](../roles/permissions-reference.md#authentication-administrator).
163+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
164+
1. Select **Custom authentication extensions**, and then select **Create a custom authentication extension**.
168165
1. In **Basics**, select the **tokenIssuanceStart** event and select **Next**.
169166
1. In **Endpoint Configuration**, fill in the following properties:
170167

@@ -361,8 +358,9 @@ Follow these steps to register the **jwt.ms** web application:
361358

362359
### 3.1 Register a test web application
363360

364-
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Active Directory**.
365-
1. Select **App registrations**, and then select **New registration**.
361+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](../roles/permissions-reference.md#application-developer).
362+
1. Browse to **Identity** > **Applications** > **Application registrations**.
363+
1. Select **New registration**.
366364
1. Enter a **Name** for the application. For example, **My Test application**.
367365
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
368366
1. In the **Select a platform** dropdown in **Redirect URI**, select **Web** and then enter `https://jwt.ms` in the URL text box.
@@ -414,12 +412,12 @@ For tokens to be issued with claims incoming from the custom authentication exte
414412

415413
Follow these steps to connect the *My Test application* with your custom authentication extension:
416414

417-
# [Azure portal](#tab/azure-portal)
415+
# [Microsoft Entra admin center](#tab/entra-admin-center)
418416

419417
First assign the custom authentication extension as a custom claims provider source:
420418

421-
1. Sign in to the [Azure portal](https://portal.azure.com) and navigate to **Azure Active Directory**.
422-
1. Select **App registrations**, and find the *My Test application* registration you created.
419+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Application Administrator](../roles/permissions-reference.md#application-administrator).
420+
1. Browse to **Identity** > **Applications** > **Application registrations**.
423421
1. In the **Overview** page, under **Managed application in local directory**, select **My Test application**.
424422
1. Under **Manage**, select **Single sign-on**.
425423
1. Under **Attributes & Claims**, select **Edit**.
@@ -630,7 +628,7 @@ If you configured the [Microsoft identity provider](#step-5-protect-your-azure-f
630628

631629
1. Under the **App registration**, enter the application ID (client ID) of the *Azure Functions authentication events API* app registration [you created previously](#step-2-register-a-custom-authentication-extension).
632630

633-
1. Go to your Azure AD tenant in which your custom authentication extension is registered, and select **Azure Active Directory** > **App registrations**.
631+
1. In the Microsoft Entra admin center:
634632
1. Select the *Azure Functions authentication events API* app registration [you created previously](#step-2-register-a-custom-authentication-extension).
635633
1. Select **Certificates & secrets** > **Client secrets** > **New client secret**.
636634
1. Add a description for your client secret.

articles/active-directory/develop/custom-extension-troubleshoot.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Troubleshoot a custom claims provider
33
titleSuffix: Microsoft identity platform
44
description: Troubleshoot and monitor your custom claims provider API. Learn how to use logging and Azure AD sign-in logs to find errors and issues in your custom claims provider API.
55
services: active-directory
6-
author: yoelhor
6+
author: davidmu1
77
manager: CelesteDG
88

99
ms.service: active-directory
@@ -44,9 +44,9 @@ Azure AD sign-in logs also integrate with [Azure Monitor](../../azure-monitor/in
4444

4545
To access the Azure AD sign-in logs:
4646

47-
1. Sign in to the [Azure portal](https://portal.azure.com).
48-
1. In the **Enterprise apps** experience for your given application, select on the **Sign-in** logs tab.
49-
1. Select the latest sign-in log.
47+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
48+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
49+
1. Select **Sign-in logs**, and then select the latest sign-in log.
5050
1. For more details, select the **Authentication Events** tab. Information related to the custom authentication extension REST API call is displayed, including any [error codes](#error-codes-reference).
5151

5252
:::image type="content" source="media/custom-extension-troubleshoot/authentication-events.png" alt-text="Screenshot that shows the authentication events information." :::
@@ -89,8 +89,8 @@ Use the following table to diagnose an error code.
8989

9090
Your REST API is protected by Azure AD access token. You can test your API by obtaining an access token with the [application registration](custom-extension-get-started.md#22-grant-admin-consent) associated with the custom authentiction extensions. After you acquire an access token, pass it the HTTP `Authorization` header. To obtain an access token, follow these steps:
9191

92-
1. Sign in to the [Azure portal](https://portal.azure.com) with your Azure administrator account.
93-
1. Select **Azure Active Directory** > **App registrations**.
92+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
93+
1. Browse to **Identity** > **Applications** > **Application registrations**.
9494
1. Select the *Azure Functions authentication events API* app registration [you created previously](custom-extension-get-started.md#step-2-register-a-custom-authentication-extension).
9595
1. Copy the [application ID](custom-extension-get-started.md#22-grant-admin-consent).
9696
1. If you haven't created an app secret, follow these steps:

articles/active-directory/develop/developer-support-help-options.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,11 @@ If you need an answer to a question or help in solving a problem not covered in
2323
<img alt='Azure support' src='./media/common/logo_azure.svg'>
2424
</div>
2525

26-
Explore the range of [Azure support options and choose the plan](https://azure.microsoft.com/support/plans) that best fits you. There are two options to create and manage support requests in the Azure portal:
26+
Explore the range of [Azure support options and choose the plan](https://azure.microsoft.com/support/plans) that best fits you. There are two options to create and manage support requests in the Microsoft Entra admin center:
2727

28-
- If you already have an Azure Support Plan, [open a support request here](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest).
28+
- If you already have an Azure Support Plan, [open a support request here](https://entra.microsoft.com/#view/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical).
2929

30-
- If you're using Azure AD for customers (preview), the support request feature is currently unavailable in customer tenants. However, you can use the **Give Feedback** link on the **New support request** page to provide feedback. Or, you can switch to your Azure AD workforce tenant and [open a support request](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/newsupportrequest).
30+
- If you're using Azure AD for customers (preview), the support request feature is currently unavailable in customer tenants. However, you can use the **Give Feedback** link on the **New support request** page to provide feedback. Or, you can switch to your Azure AD workforce tenant and [open a support request](https://entra.microsoft.com/#view/Microsoft_Azure_Support/NewSupportRequestV3Blade/callerName/ActiveDirectory/issueType/technical).
3131

3232
- If you're not an Azure customer, you can open a support request with [Microsoft Support for business](https://support.serviceshub.microsoft.com/supportforbusiness).
3333

articles/active-directory/manage-apps/add-application-portal-setup-sso.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,9 @@ To configure SSO, you need:
3838

3939
To enable SSO for an application:
4040

41-
1. Sign in to the [Azure portal](https://portal.azure.com) and sign in using one of the roles listed in the prerequisites.
42-
1. Browse to **Azure Active Directory** > **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to use. For example, **Azure AD SAML Toolkit 1**.
41+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
42+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
43+
1. Enter the name of the existing application in the search box, and then select the application from the search results. For example, **Azure AD SAML Toolkit 1**.
4344
1. In the **Manage** section of the left menu, select **Single sign-on** to open the **Single sign-on** pane for editing.
4445
1. Select **SAML** to open the SSO configuration page. After the application is configured, users can sign in to it by using their credentials from the Azure AD tenant.
4546
1. The process of configuring an application to use Azure AD for SAML-based SSO varies depending on the application. For any of the enterprise applications in the gallery, use the **configuration guide** link to find information about the steps needed to configure the application. The steps for the **Azure AD SAML Toolkit 1** are listed in this article.
@@ -54,7 +55,7 @@ You add sign-in and reply URL values, and you download a certificate to begin th
5455

5556
To configure SSO in Azure AD:
5657

57-
1. In the Azure portal, select **Edit** in the **Basic SAML Configuration** section on the **Set up single sign-on** pane.
58+
1. In the Entra admin center, select **Edit** in the **Basic SAML Configuration** section on the **Set up single sign-on** pane.
5859
1. For **Reply URL (Assertion Consumer Service URL)**, enter `https://samltoolkit.azurewebsites.net/SAML/Consume`.
5960
1. For **Sign on URL**, enter `https://samltoolkit.azurewebsites.net/`.
6061
1. Select **Save**.
@@ -94,7 +95,7 @@ Use the values that you recorded for **SP Initiated Login URL** and **Assertion
9495

9596
To update the single sign-on values:
9697

97-
1. In the Azure portal, select **Edit** in the **Basic SAML Configuration** section on the **Set up single sign-on** pane.
98+
1. In the Entra admin center, select **Edit** in the **Basic SAML Configuration** section on the **Set up single sign-on** pane.
9899
1. For **Reply URL (Assertion Consumer Service URL)**, enter the **Assertion Consumer Service (ACS) URL** value that you previously recorded.
99100
1. For **Sign on URL**, enter the **SP Initiated Login URL** value that you previously recorded.
100101
1. Select **Save**.

0 commit comments

Comments
 (0)