Skip to content

Commit 15ffbce

Browse files
author
Mike Ray (Microsoft)
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into 20220315-arc-data-march-release
2 parents 91e70a8 + 7a6fc3b commit 15ffbce

File tree

73 files changed

+923
-319
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+923
-319
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -160,6 +160,46 @@
160160
"redirect_url": "/azure/active-directory/develop/workload-identity-federation-create-trust",
161161
"redirect_document_id": false
162162
},
163+
{
164+
"source_path_from_root": "/articles/active-directory/develop/workload-identities-overview.md",
165+
"redirect_url": "/azure/active-directory/workload-identities/workload-identities-overview",
166+
"redirect_document_id": false
167+
},
168+
{
169+
"source_path_from_root": "/articles/active-directory/develop/workload-identities-faqs.md",
170+
"redirect_url": "/azure/active-directory/workload-identities/workload-identities-faqs",
171+
"redirect_document_id": false
172+
},
173+
{
174+
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation.md",
175+
"redirect_url": "/azure/active-directory/workload-identities/workload-identity-federation",
176+
"redirect_document_id": false
177+
},
178+
{
179+
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-create-trust.md",
180+
"redirect_url": "/azure/active-directory/workload-identities/workload-identity-federation-create-trust",
181+
"redirect_document_id": false
182+
},
183+
{
184+
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-create-trust-user-assigned-managed-identity.md",
185+
"redirect_url": "/azure/active-directory/workload-identities/workload-identity-federation-create-trust-user-assigned-managed-identity",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-create-trust-gcp.md",
190+
"redirect_url": "/azure/active-directory/workload-identities/workload-identity-federation-create-trust-gcp",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-block-using-azure-policy.md",
195+
"redirect_url": "/azure/active-directory/workload-identities/workload-identity-federation-block-using-azure-policy",
196+
"redirect_document_id": false
197+
},
198+
{
199+
"source_path_from_root": "/articles/active-directory/develop/workload-identity-federation-considerations.md",
200+
"redirect_url": "/azure/active-directory/workload-identities/workload-identity-federation-considerations",
201+
"redirect_document_id": false
202+
},
163203
{
164204
"source_path_from_root": "/articles/active-directory/develop/active-directory-v2-limitations.md",
165205
"redirect_url": "/azure/active-directory/develop/v2-overview",

articles/active-directory/conditional-access/concept-continuous-access-evaluation-workload.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Respond to changes to applications with continuous access evaluatio
44

55
services: active-directory
66
ms.service: active-directory
7-
ms.subservice: conditional-access
7+
ms.subservice: workload-identities
88
ms.topic: conceptual
99
ms.date: 07/22/2022
1010

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Protecting workload identities with Conditional Access policies
44

55
services: active-directory
66
ms.service: active-directory
7-
ms.subservice: conditional-access
7+
ms.subservice: workload-identities
88
ms.topic: how-to
99
ms.date: 01/05/2023
1010

@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919

2020
Conditional Access policies have historically applied only to users when they access apps and services like SharePoint online or the Azure portal. We're now extending support for Conditional Access policies to be applied to service principals owned by the organization. We call this capability Conditional Access for workload identities.
2121

22-
A [workload identity](../develop/workload-identities-overview.md) is an identity that allows an application or service principal access to resources, sometimes in the context of a user. These workload identities differ from traditional user accounts as they:
22+
A [workload identity](../workload-identities/workload-identities-overview.md) is an identity that allows an application or service principal access to resources, sometimes in the context of a user. These workload identities differ from traditional user accounts as they:
2323

2424
- Can’t perform multifactor authentication.
2525
- Often have no formal lifecycle process.

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,7 @@
6262
- name: Application model
6363
href: application-model.md
6464
- name: Workload identities
65-
href: workload-identities-overview.md
66-
- name: Workload identities FAQs
67-
href: workload-identities-faqs.md
65+
href: ../workload-identities/workload-identities-overview.md
6866
- name: Applications and service principals
6967
href: app-objects-and-service-principals.md
7068
- name: How and why apps are added to Azure AD
@@ -162,16 +160,6 @@
162160
href: howto-handle-samesite-cookie-changes-chrome-browser.md
163161
- name: Connect
164162
items:
165-
- name: Workload identity federation
166-
href: workload-identity-federation.md
167-
- name: Configure an app to trust an external identity provider
168-
href: workload-identity-federation-create-trust.md
169-
- name: Configure a managed identity to trust an external identity provider
170-
href: workload-identity-federation-create-trust-user-assigned-managed-identity.md
171-
- name: Access identity platform-protected resources from GCP
172-
href: workload-identity-federation-create-trust-gcp.md
173-
- name: Block creation of federated credentials
174-
href: workload-identity-federation-block-using-azure-policy.md
175163
- name: Exchange AD FS SAML for Microsoft Graph access token
176164
displayName: exchange, swap, SAML token, OAuth token
177165
href: v2-saml-bearer-assertion.md
@@ -804,9 +792,7 @@
804792
- name: Signing key rollover
805793
href: active-directory-signing-key-rollover.md
806794
- name: UserInfo endpoint (OIDC)
807-
href: userinfo.md
808-
- name: Federated identity credentials considerations and limitations
809-
href: workload-identity-federation-considerations.md
795+
href: userinfo.md
810796
- name: SAML 2.0
811797
items:
812798
- name: How Azure AD uses the SAML protocol

articles/active-directory/develop/console-quickstart-portal-nodejs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,8 +61,8 @@ ms.custom: mode-api
6161
> ##### Global tenant administrator
6262
>
6363
> If you are a global administrator, go to **API Permissions** page select **Grant admin consent for > Enter_the_Tenant_Name_Here**
64-
> > > [!div id="apipermissionspage"]
65-
> > > [Go to the API Permissions page]()
64+
> > [!div id="apipermissionspage"]
65+
> > [Go to the API Permissions page]()
6666
>
6767
> ##### Standard user
6868
>

articles/active-directory/develop/developer-glossary.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: reference
11-
ms.date: 05/28/2022
11+
ms.date: 03/15/2023
1212
ms.author: ryanwi
13-
ms.reviewer: mmacy
13+
ms.reviewer:
1414
---
1515

1616
# Glossary: Microsoft identity platform
1717

18-
You'll see these terms when you use our documentation, the Azure portal, our authentication libraries, and the Microsoft Graph API. Some terms are Microsoft-specific while others are related to protocols like OAuth or other technologies you use with the Microsoft identity platform.
18+
You see these terms when you use our documentation, the Azure portal, our authentication libraries, and the Microsoft Graph API. Some terms are Microsoft-specific while others are related to protocols like OAuth or other technologies you use with the Microsoft identity platform.
1919

2020
## Access token
2121

@@ -52,7 +52,7 @@ For more information, see [Application and Service Principal Objects][AAD-App-SP
5252

5353
In order to allow an application to integrate with and delegate Identity and Access Management functions to Azure AD, it must be registered with an Azure AD [tenant](#tenant). When you register your application with Azure AD, you're providing an identity configuration for your application, allowing it to integrate with Azure AD and use features like:
5454

55-
- Robust management of Single Sign-On using Azure AD Identity Management and [OpenID Connect][OpenIDConnect] protocol implementation
55+
- Robust management of single sign-on using Azure AD Identity Management and [OpenID Connect][OpenIDConnect] protocol implementation
5656
- Brokered access to [protected resources](#resource-server) by [client applications](#client-application), via OAuth 2.0 [authorization server](#authorization-server)
5757
- [Consent framework](#consent) for managing client access to protected resources, based on resource owner authorization.
5858

@@ -222,11 +222,11 @@ One of the endpoints implemented by the [authorization server](#authorization-se
222222

223223
## User-agent-based client
224224

225-
A type of [client application](#client-application) that downloads code from a web server and executes within a user-agent (for instance, a web browser), such as a single-page application (SPA). Since all code is executed on a device, it is considered a "public" client due to its inability to store credentials privately/confidentially. For more information, see [OAuth 2.0 client types and profiles][OAuth2-Client-Types].
225+
A type of [client application](#client-application) that downloads code from a web server and executes within a user-agent (for instance, a web browser), such as a single-page application (SPA). Since all code is executed on a device, it's considered a "public" client due to its inability to store credentials privately/confidentially. For more information, see [OAuth 2.0 client types and profiles][OAuth2-Client-Types].
226226

227227
## User principal
228228

229-
Similar to the way a service principal object is used to represent an application instance, a user principal object is another type of security principal, which represents a user. The Microsoft Graph [User resource type][Graph-User-Resource] defines the schema for a user object, including user-related properties like first and last name, user principal name, directory role membership, etc. This provides the user identity configuration for Azure AD to establish a user principal at run-time. The user principal is used to represent an authenticated user for Single Sign-On, recording [consent](#consent) delegation, making access control decisions, etc.
229+
Similar to the way a service principal object is used to represent an application instance, a user principal object is another type of security principal, which represents a user. The Microsoft Graph [User resource type][Graph-User-Resource] defines the schema for a user object, including user-related properties like first and last name, user principal name, directory role membership, etc. This provides the user identity configuration for Azure AD to establish a user principal at run-time. The user principal is used to represent an authenticated user for single sign-on, recording [consent](#consent) delegation, making access control decisions, etc.
230230

231231
## Web client
232232

articles/active-directory/develop/workload-identities-overview.md

Lines changed: 0 additions & 56 deletions
This file was deleted.

articles/active-directory/identity-protection/concept-workload-identity-risk.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Workload identity risk in Azure Active Directory Identity Protectio
44

55
services: active-directory
66
ms.service: active-directory
7-
ms.subservice: identity-protection
7+
ms.subservice: workload-identities
88
ms.topic: conceptual
99
ms.date: 11/10/2022
1010

@@ -16,7 +16,7 @@ ms.reviewer: etbasser
1616
ms.collection: M365-identity-device-management
1717
---
1818

19-
# Securing workload identities with Identity Protection
19+
# Securing workload identities
2020

2121
Azure AD Identity Protection has historically protected users in detecting, investigating, and remediating identity-based risks. We're now extending these capabilities to workload identities to protect applications and service principals.
2222

Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
- name: Microsoft Entra Workload Identities documentation
2+
href: index.yml
3+
- name: Overview
4+
expanded: true
5+
items:
6+
- name: What are workload identities?
7+
href: workload-identities-overview.md
8+
- name: Workload identities FAQs
9+
href: workload-identities-faqs.md
10+
- name: Concepts
11+
items:
12+
- name: Applications and service principals
13+
href: ../develop/app-objects-and-service-principals.md?toc=/azure/active-directory/workload-identities/toc.json&bc=/azure/active-directory/workload-identities/breadcrumb/toc.json
14+
- name: Managed identities
15+
href: ../managed-identities-azure-resources/overview.md?toc=/azure/active-directory/workload-identities/toc.json&bc=/azure/active-directory/workload-identities/breadcrumb/toc.json
16+
- name: Workload identity federation
17+
href: workload-identity-federation.md
18+
- name: Securing workload identities
19+
href: ../identity-protection/concept-workload-identity-risk.md?toc=/azure/active-directory/workload-identities/toc.json&bc=/azure/active-directory/workload-identities/breadcrumb/toc.json
20+
- name: Conditional Access for workload identities
21+
href: ../conditional-access/workload-identity.md?toc=/azure/active-directory/workload-identities/toc.json&bc=/azure/active-directory/workload-identities/breadcrumb/toc.json
22+
- name: Conditional access evaluation for workload identities
23+
href: ../conditional-access/concept-continuous-access-evaluation-workload.md?toc=/azure/active-directory/workload-identities/toc.json&bc=/azure/active-directory/workload-identities/breadcrumb/toc.json
24+
- name: How-to guides
25+
items:
26+
- name: Connect workloads without managing secrets
27+
items:
28+
- name: Configure an app to trust an external identity provider
29+
href: workload-identity-federation-create-trust.md
30+
- name: Configure a managed identity to trust an external identity provider
31+
href: workload-identity-federation-create-trust-user-assigned-managed-identity.md
32+
- name: Access identity platform-protected resources from GCP
33+
href: workload-identity-federation-create-trust-gcp.md
34+
- name: Block creation of federated credentials
35+
href: workload-identity-federation-block-using-azure-policy.md
36+
- name: Create an access review
37+
href: ../privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review.md?toc=/azure/active-directory/workload-identities/toc.json&bc=/azure/active-directory/workload-identities/breadcrumb/toc.json
38+
- name: Manage custom security attributes for an app
39+
href: ../manage-apps/custom-security-attributes-apps.md?toc=/azure/active-directory/workload-identities/toc.json&bc=/azure/active-directory/workload-identities/breadcrumb/toc.json
40+
- name: Reference
41+
items:
42+
- name: Federated identity credentials considerations and limitations
43+
href: workload-identity-federation-considerations.md

0 commit comments

Comments
 (0)