Skip to content

Commit 1973617

Browse files
authored
Merge pull request #217546 from MicrosoftDocs/main
Publish to live, Tuesday 4 AM PST, 11/8
2 parents f5dfb04 + c570c8c commit 1973617

File tree

217 files changed

+2301
-1614
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

217 files changed

+2301
-1614
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,11 @@
130130
"redirect_url": "/azure/aks/monitor-aks",
131131
"redirect_document_id": false
132132
},
133+
{
134+
"source_path_from_root": "/articles/aks/workload-identity-migration-sidecar.md",
135+
"redirect_url": "/azure/aks/workload-identity-migrate-from-pod-identity",
136+
"redirect_document_id": false
137+
},
133138
{
134139
"source_path": "articles/api-management/zone-redundancy.md",
135140
"redirect_url": "/azure/availability-zones/migrate-api-mgt",

articles/active-directory-b2c/aad-sspr-technical-profile.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/23/2020
12+
ms.date: 11/08/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -26,8 +26,6 @@ This technical profile:
2626
- Uses the Azure AD SSPR service to generate and send a code to an email address, and then verifies the code.
2727
- Validates an email address via a verification code.
2828

29-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
30-
3129
## Protocol
3230

3331
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C:

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/27/2022
12+
ms.date: 11/08/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -22,7 +22,9 @@ Azure Active Directory B2C [user flows and custom policies](user-flow-overview.m
2222
## Terms for features in public preview
2323

2424
- We encourage you to use public preview features for evaluation purposes only.
25+
2526
- [Service level agreements (SLAs)](https://azure.microsoft.com/support/legal/sla/active-directory-b2c) don't apply to public preview features.
27+
2628
- Support requests for public preview features can be submitted through regular support channels.
2729

2830
## User flows
@@ -156,7 +158,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
156158
| ------- | :--: | ----- |
157159
| [MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods) | GA | Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
158160
| [Phone factor authentication](phone-factor-technical-profile.md) | GA | |
159-
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | Preview | |
161+
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | GA | |
160162
| [One-time password](one-time-password-technical-profile.md) | GA | |
161163
| [Azure Active Directory](active-directory-technical-profile.md) as local directory | GA | |
162164
| [Predicate validations](predicates.md) | GA | For example, password complexity. |

articles/active-directory-b2c/multi-factor-auth-technical-profile.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/09/2021
12+
ms.date: 11/08/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -18,7 +18,6 @@ ms.subservice: B2C
1818

1919
Azure Active Directory B2C (Azure AD B2C) provides support for verifying a phone number by using a verification code, or verifying a Time-based One-time Password (TOTP) code.
2020

21-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
2221

2322
## Protocol
2423

articles/active-directory/conditional-access/overview.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: overview
9-
ms.date: 08/05/2022
9+
ms.date: 11/07/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -93,6 +93,10 @@ Risk-based policies require access to [Identity Protection](../identity-protecti
9393

9494
Other products and features that may interact with Conditional Access policies require appropriate licensing for those products and features.
9595

96+
When licenses required for Conditional Access expire, policies aren't automatically disabled or deleted so customers can migrate away from Conditional Access policies without a sudden change in their security posture. Remaining policies can be viewed and deleted, but no longer updated.
97+
98+
[Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) help protect against identity-related attacks and are available for all customers.
99+
96100
## Next steps
97101

98102
- [Building a Conditional Access policy piece by piece](concept-conditional-access-policies.md)
32.7 KB
Loading

articles/active-directory/external-identities/reset-redemption-status.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,19 +13,20 @@ ms.author: mimart
1313
author: msmimart
1414
manager: celestedg
1515

16-
ms.collection: M365-identity-device-management
16+
ms.collection: engagement-fy23, M365-identity-device-management
17+
# Customer intent: As a tenant administrator, I want to update the sign-in information for a guest user.
1718
---
1819

1920
# Reset redemption status for a guest user (Preview)
2021

21-
After a guest user has redeemed your invitation for B2B collaboration, there might be times when you'll need to update their sign-in information, for example when:
22+
In this article, you'll learn how to update the [guest user's](user-properties.md) sign-in information after they've redeemed your invitation for B2B collaboration. There might be times when you'll need to update their sign-in information, for example when:
2223

2324
- The user wants to sign in using a different email and identity provider
2425
- The account for the user in their home tenant has been deleted and re-created
2526
- The user has moved to a different company, but they still need the same access to your resources
2627
- The user’s responsibilities have been passed along to another user
2728

28-
To manage these scenarios previously, you had to manually delete the guest user’s account from your directory and reinvite the user. Now you can use PowerShell or the Microsoft Graph invitation API to reset the user's redemption status and reinvite the user while keeping the user's object ID, group memberships, and app assignments. When the user redeems the new invitation, the UPN of the user doesn't change, but the user's sign-in name changes to the new email. Then the user can sign in using the new email or an email you've added to the `otherMails` property of the user object.
29+
To manage these scenarios previously, you had to manually delete the guest user’s account from your directory and reinvite the user. Now you can use the Azure portal, PowerShell or the Microsoft Graph invitation API to reset the user's redemption status and reinvite the user while keeping the user's object ID, group memberships, and app assignments. When the user redeems the new invitation, the [UPN](../hybrid/plan-connect-userprincipalname.md#what-is-userprincipalname) of the user doesn't change, but the user's sign-in name changes to the new email. Then the user can sign in using the new email or an email you've added to the `otherMails` property of the user object.
2930

3031
## Use the Azure portal to reset redemption status
3132

@@ -34,17 +35,18 @@ To manage these scenarios previously, you had to manually delete the guest user
3435
1. Select **Users**.
3536
1. In the list, select the user's name to open their user profile.
3637
1. If the user wants to sign in using a different email:
37-
- Select the **Properties** tab.
38-
- Select the **Edit** icon next to **Contact information**.
38+
- Select **Edit properties**.
39+
- Select the **Contact Information** tab.
3940
- Next to **Email**, type the new email.
4041
- Update **Other emails** to also include the new email.
4142
- Select the **Save** button at the bottom of the page.
4243

43-
1. In the **Overview** tab, under **My Feed**, select **B2B collaboration**.
44-
![new user profile page displaying the B2B Collaboration tile](./media/reset-redemption-status/user-profile-b2b-collaboration.png)
45-
1. Under **Redemption status**, next to **Reset invitation status? (Preview)**, select **Yes**.
46-
1. Select **Yes** to confirm.
44+
1. On the **Overview** tab, under **My Feed**, select the **Manage (resend invitation / reset status)** link in the **B2B collaboration** tile.
45+
46+
:::image type="content" source="media/reset-redemption-status/user-profile-b2b-collaboration.png" alt-text="Screenshot of the guest user's profile overview." lightbox="media/reset-redemption-status/user-profile-b2b-collaboration.png":::
4747

48+
1. In the **Manage invitations** pane, under **Redemption status**, set **Reset invitation status? (Preview)** to **Yes**.
49+
1. Select **Yes** to confirm.
4850

4951
## Use PowerShell or Microsoft Graph API to reset redemption status
5052

@@ -79,7 +81,7 @@ New-MgInvitation `
7981

8082
### Use Microsoft Graph API to reset redemption status
8183

82-
Using the [Microsoft Graph invitation API](/graph/api/resources/invitation), set the `resetRedemption` property to `true` and specify the new email address in the `invitedUserEmailAddress` property.
84+
To use the [Microsoft Graph invitation API](/graph/api/resources/invitation), set the `resetRedemption` property to `true` and specify the new email address in the `invitedUserEmailAddress` property.
8385

8486
```json
8587
POST https://graph.microsoft.com/beta/invitations
@@ -112,3 +114,4 @@ ContentType: application/json
112114

113115
- [Add Azure Active Directory B2B collaboration users by using PowerShell](customize-invitation-api.md#powershell)
114116
- [Properties of an Azure AD B2B guest user](user-properties.md)
117+
- [B2B for Azure AD integrated apps](configure-saas-apps.md)

articles/active-directory/governance/how-to-lifecycle-workflow-sync-attributes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ The following table shows the scheduling (trigger) relevant attributes and the m
2323
|Attribute|Type|Supported in HR Inbound Provisioning|Support in Azure AD Connect Cloud Sync|Support in Azure AD Connect Sync|
2424
|-----|-----|-----|-----|-----|
2525
|employeeHireDate|DateTimeOffset|Yes|Yes|Yes|
26-
|employeeLeaveDateTime|DateTimeOffset|Yes|Yes|Not currently|
26+
|employeeLeaveDateTime|DateTimeOffset|Yes|Yes|Yes|
2727

2828
> [!NOTE]
2929
> Manually setting the employeeLeaveDateTime for cloud-only users requires special permissions. For more information, see: [Configure the employeeLeaveDateTime property for a user](/graph/tutorial-lifecycle-workflows-set-employeeleavedatetime)

articles/active-directory/hybrid/how-to-connect-staged-rollout.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ To configure Staged Rollout, follow these steps:
182182

183183
1. On the *Azure AD Connect* page, under the *Staged rollout of cloud authentication*, select the **Enable staged rollout for managed user sign-in** link.
184184

185-
1. On the *Enable staged rollout feature* page, select the options you want to enable: [Password Hash Sync](./whatis-phs.md), [Pass-through authentication](./how-to-connect-pta.md), [Seamless single sign-on](./how-to-connect-sso.md), or [Certificate-based Authentication (Preview)](../authentication/active-directory-certificate-based-authentication-get-started.md). For example, if you want to enable **Password Hash Sync** and **Seamless single sign-on**, slide both controls to **On**.
185+
1. On the *Enable staged rollout feature* page, select the options you want to enable: [Password Hash Sync](./whatis-phs.md), [Pass-through authentication](./how-to-connect-pta.md), [Seamless single sign-on](./how-to-connect-sso.md), or [Certificate-based Authentication](../authentication/active-directory-certificate-based-authentication-get-started.md). For example, if you want to enable **Password Hash Sync** and **Seamless single sign-on**, slide both controls to **On**.
186186

187187
1. Add groups to the features you selected. For example, *pass-through authentication* and *seamless SSO*. To avoid a time-out, ensure that the security groups contain no more than 200 members initially.
188188

articles/active-directory/saas-apps/amazon-business-tutorial.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/16/2021
12+
ms.date: 11/08/2022
1313
ms.author: jeedes
1414
---
1515

@@ -190,7 +190,15 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
190190
191191
## Configure Amazon Business SSO
192192

193-
1. In a different web browser window, sign in to your Amazon Business company site as an administrator.
193+
1. To automate the configuration within Amazon Business, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
194+
195+
![My apps extension](common/install-myappssecure-extension.png)
196+
197+
1. After adding extension to the browser, click on **Set up Amazon Business** will direct you to the Amazon Business Single Sign-On application. From there, provide the admin credentials to sign in to Amazon Business Single Sign-On. The browser extension will automatically configure the application for you and automate steps 3-17.
198+
199+
![Setup configuration](common/setup-sso.png)
200+
201+
1. If you want to set up Amazon Business manually, in a different web browser window, sign in to your Amazon Business company site as an administrator.
194202

195203
1. Click on the **User Profile** and select **Business Settings**.
196204

0 commit comments

Comments
 (0)