Skip to content

Commit 135db1e

Browse files
authored
Merge pull request #241107 from MicrosoftDocs/main
6/09/2023 3PM Publishing
2 parents 76b3e76 + 6d8ca05 commit 135db1e

File tree

116 files changed

+3147
-1139
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

116 files changed

+3147
-1139
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/develop/reference-app-multi-instancing.md",
5+
"redirect_url": "/azure/active-directory/develop/configure-app-multi-instancing",
6+
"redirect_document_id": false
7+
},
38
{
49
"source_path_from_root": "/articles/active-directory/develop/active-directory-enterprise-app-role-management.md",
510
"redirect_url": "/azure/active-directory/develop/enterprise-app-role-management",

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -462,9 +462,8 @@
462462
href: saml-claims-customization.md
463463
- name: Set an access token lifetime policy
464464
href: configure-token-lifetimes.md
465-
- name: SAML app multi-instancing
466-
displayName: Configure SAML app multi-instancing for an application
467-
href: reference-app-multi-instancing.md
465+
- name: Configure app multi-instancing
466+
href: configure-app-multi-instancing.md
468467
- name: Custom claims provider
469468
items:
470469
- name: Token issuance start event
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
---
2+
title: Configure app multi-instancing
3+
description: Learn about multi-instancing, which is needed for configuring multiple instances of the same application within a tenant.
4+
services: active-directory
5+
author: davidmu1
6+
manager: CelesteDG
7+
ms.service: active-directory
8+
ms.subservice: develop
9+
ms.custom: aaddev, curation-claims
10+
ms.workload: identity
11+
ms.topic: how-to
12+
ms.date: 06/09/2023
13+
ms.author: davidmu
14+
ms.reviewer: rahulnagraj, alamaral, jeedes
15+
---
16+
17+
# Configure app multi-instancing
18+
19+
App multi-instancing refers to the need for the configuration of multiple instances of the same application within a tenant. For example, the organization has multiple accounts, each of which needs a separate service principal to handle instance-specific claims mapping and roles assignment. Or the customer has multiple instances of an application, which doesn't need special claims mapping, but does need separate service principals for separate signing keys.
20+
21+
## Sign-in approaches
22+
23+
A user can sign-in to an application one of the following ways:
24+
25+
- Through the application directly, which is known as service provider (SP) initiated single sign-on (SSO).
26+
- Go directly to the identity provider (IDP), known as IDP initiated SSO.
27+
28+
Depending on which approach is used within your organization, follow the appropriate instructions described in this article.
29+
30+
## SP initiated SSO
31+
32+
In the SAML request of SP initiated SSO, the `issuer` specified is usually the app ID URI. Utilizing App ID URI doesn't allow the customer to distinguish which instance of an application is being targeted when using SP initiated SSO.
33+
34+
### Configure SP initiated SSO
35+
36+
Update the SAML single sign-on service URL configured within the service provider for each instance to include the service principal guid as part of the URL. For example, the general SSO sign-in URL for SAML is `https://login.microsoftonline.com/<tenantid>/saml2`, the URL can be updated to target a specific service principal, such as `https://login.microsoftonline.com/<tenantid>/saml2/<issuer>`.
37+
38+
Only service principal identifiers in GUID format are accepted for the issuer value. The service principal identifiers override the issuer in the SAML request and response, and the rest of the flow is completed as usual. There's one exception: if the application requires the request to be signed, the request is rejected even if the signature was valid. The rejection is done to avoid any security risks with functionally overriding values in a signed request.
39+
40+
## IDP initiated SSO
41+
42+
The IDP initiated SSO feature exposes the following settings for each application:
43+
44+
- An **audience override** option exposed for configuration by using claims mapping or the portal. The intended use case is applications that require the same audience for multiple instances. This setting is ignored if no custom signing key is configured for the application.
45+
46+
- An **issuer with application id** flag to indicate the issuer should be unique for each application instead of unique for each tenant. This setting is ignored if no custom signing key is configured for the application.
47+
48+
### Configure IDP initiated SSO
49+
50+
1. Open any SSO enabled enterprise app and navigate to the SAML single sign-on blade.
51+
1. Select **Edit** on the **User Attributes & Claims** panel.
52+
1. Select **Edit** to open the advanced options blade.
53+
1. Configure both options according to your preferences and then select **Save**.
54+
55+
## Next steps
56+
57+
- To learn more about how to configure this policy see [Customize app SAML token claims](active-directory-saml-claims-customization.md)

articles/active-directory/develop/enterprise-app-role-management.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure the role claim for enterprise applications
2+
title: Configure the role claim
33
description: Learn how to configure the role claim issued in the SAML token for enterprise applications in Azure Active Directory.
44
services: active-directory
55
author: davidmu1
@@ -9,14 +9,14 @@ ms.subservice: develop
99
ms.custom: aaddev
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 02/10/2023
12+
ms.date: 06/09/2023
1313
ms.author: davidmu
1414
ms.reviewer: jeedes
1515
---
1616

17-
# Configure the role claim issued in the SAML token
17+
# Configure the role claim
1818

19-
In Azure Active Directory (Azure AD), you can customize the role claim in the access token that is received after an application is authorized. Use this feature if your application expects custom roles in the token returned by Azure AD. You can create as many roles as you need.
19+
You can customize the role claim in the access token that is received after an application is authorized. Use this feature if your application expects custom roles in the token. You can create as many roles as you need.
2020

2121
## Prerequisites
2222

@@ -26,7 +26,7 @@ In Azure Active Directory (Azure AD), you can customize the role claim in the ac
2626
- A user account that is assigned to the role. For more information, see [Quickstart: Create and assign a user account](../manage-apps/add-application-portal-assign-users.md).
2727

2828
> [!NOTE]
29-
> This article explains how to create, update, or delete application roles on the service principal using APIs in Azure AD. To use the new user interface for App Roles, see [Add app roles to your application and receive them in the token](howto-add-app-roles-in-azure-ad-apps.md).
29+
> This article explains how to create, update, or delete application roles on the service principal using APIs. To use the new user interface for App Roles, see [Add app roles to your application and receive them in the token](howto-add-app-roles-in-azure-ad-apps.md).
3030
3131
## Locate the enterprise application
3232

@@ -105,7 +105,7 @@ Use the Microsoft Graph Explorer to add roles to an enterprise application.
105105
}
106106
```
107107

108-
You can only add new roles after msiam_access for the patch operation. Also, you can add as many roles as your organization needs. Azure AD sends the value of these roles as the claim value in the SAML response. To generate the GUID values for the ID of new roles use the web tools, such as the [Online GUID / UUID Generator](https://www.guidgenerator.com/). The appRoles property should now represent what was in the request body of the query.
108+
You can only add new roles after msiam_access for the patch operation. Also, you can add as many roles as your organization needs. The value of these roles is sent as the claim value in the SAML response. To generate the GUID values for the ID of new roles use the web tools, such as the [Online GUID / UUID Generator](https://www.guidgenerator.com/). The appRoles property should represent what was in the request body of the query.
109109

110110
## Edit attributes
111111

articles/active-directory/develop/reference-app-multi-instancing.md

Lines changed: 0 additions & 56 deletions
This file was deleted.

articles/active-directory/enterprise-users/groups-self-service-management.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ ms.custom: "it-pro;seo-update-azuread-jan"
1717

1818
ms.collection: M365-identity-device-management
1919
---
20+
2021
# Set up self-service group management in Azure Active Directory
2122

2223
You can enable users to create and manage their own security groups or Microsoft 365 groups in Azure Active Directory (Azure AD), part of Microsoft Entra. The owner of the group can approve or deny membership requests, and can delegate control of group membership. Self-service group management features are not available for [mail-enabled security groups or distribution lists](../fundamentals/concept-learn-about-groups.md).
@@ -44,19 +45,21 @@ Groups created in | Security group default behavior | Microsoft 365 group defaul
4445

4546
1. Sign in to the [Azure portal](https://portal.azure.com) with an account that's been assigned the Global Administrator or Groups Administrator role for the directory.
4647

47-
1. Browse to **Azure Active Directory** > **Groups**, and then select **General** settings.
48+
2. Browse to **Azure Active Directory** > **Groups**, and then select **General** settings.
4849

49-
![Azure Active Directory groups general settings.](./media/groups-self-service-management/groups-settings-general.png)
50+
![Azure Active Directory groups general settings.](./media/groups-self-service-management/groups-settings-general.png)
51+
> [!NOTE]
52+
> In November 2023, the setting **Restrict users access to My Groups** will change to **Restrict users ability to see and edit security groups in My Groups.** If the setting is currently set to ‘Yes,’ end users will be able to access My Groups in November 2023, but will not be able to see security groups.
5053
51-
1. Set **Owners can manage group membership requests in the Access Panel** to **Yes**.
54+
3. Set **Owners can manage group membership requests in the Access Panel** to **Yes**.
5255

53-
1. Set **Restrict user ability to access groups features in the Access Panel** to **No**.
56+
4. Set **Restrict user ability to access groups features in the Access Panel** to **No**.
5457

55-
1. Set **Users can create security groups in Azure portals, API or PowerShell** to **Yes** or **No**.
58+
5. Set **Users can create security groups in Azure portals, API or PowerShell** to **Yes** or **No**.
5659

5760
For more information about this setting, see the next section [Group settings](#group-settings).
5861

59-
1. Set **Users can create Microsoft 365 groups in Azure portals, API or PowerShell** to **Yes** or **No**.
62+
6. Set **Users can create Microsoft 365 groups in Azure portals, API or PowerShell** to **Yes** or **No**.
6063

6164
For more information about this setting, see the next section [Group settings](#group-settings).
6265

@@ -103,3 +106,6 @@ These articles provide additional information on Azure Active Directory.
103106
* [Application Management in Azure Active Directory](../manage-apps/what-is-application-management.md)
104107
* [What is Azure Active Directory?](../fundamentals/active-directory-whatis.md)
105108
* [Integrate your on-premises identities with Azure Active Directory](../hybrid/whatis-hybrid-identity.md)
109+
110+
111+

articles/active-directory/external-identities/customers/how-to-single-page-app-vanillajs-configure-authentication.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,16 +9,16 @@ ms.author: owenrichards
99
ms.service: active-directory
1010
ms.subservice: ciam
1111
ms.topic: tutorial
12-
ms.date: 05/25/2023
12+
ms.date: 06/09/2023
1313

1414
#Customer intent: As a developer, I want to learn how to configure vanilla JavaScript single-page app (SPA) to sign in and sign out users with my Azure Active Directory (AD) for customers tenant.
1515
---
1616

1717
# Tutorial: Handle authentication flows in a vanilla JavaScript single-page app
1818

19-
In the [previous article](./how-to-single-page-app-vanillajs-prepare-app.md), you created a vanilla JavaScript (JS) single-page application (SPA) and a server to host it. In this article, you'll configure the application to authenticate and authorize users to access protected resources. Authentication and authorization are handled by the [Microsoft Authentication Library for JavaScript (MSAL.js)](/javascript/api/overview/).
19+
In the [previous article](./how-to-single-page-app-vanillajs-prepare-app.md), you created a vanilla JavaScript (JS) single-page application (SPA) and a server to host it. This article shows you how to configure the application to authenticate and authorize users to access protected resources.
2020

21-
In this tutorial you'll;
21+
In this tutorial;
2222

2323
> [!div class="checklist"]
2424
> * Configure the settings for the application
@@ -97,7 +97,7 @@ The application uses the [Implicit Grant Flow](../../develop/v2-oauth2-implicit-
9797
```
9898

9999
1. Replace the following values with the values from the Azure portal:
100-
- Find the `Enter_the_Application_Id_Here` value and replace it with the **application ID (clientId)** of the app you registered in the Microsoft Entra admin center.
100+
- Find the `Enter_the_Application_Id_Here` value and replace it with the **Application ID (clientId)** of the app you registered in the Microsoft Entra admin center.
101101
- In **Authority**, find `Enter_the_Tenant_Subdomain_Here` and replace it with the subdomain of your tenant. For example, if your tenant primary domain is *caseyjensen@onmicrosoft.com*, the value you should enter is *casyjensen*.
102102
1. Save the file.
103103

0 commit comments

Comments
 (0)