Skip to content

Commit 19d1f24

Browse files
authored
Merge pull request #239464 from MicrosoftDocs/main
5/26 PM Publish
2 parents 712b574 + 81411d9 commit 19d1f24

File tree

108 files changed

+2095
-1285
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

108 files changed

+2095
-1285
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/develop/active-directory-schema-extensions.md",
5+
"redirect_url": "/azure/active-directory/develop/schema-extensions",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/active-directory/develop/active-directory-optional-claims.md",
10+
"redirect_url": "/azure/active-directory/develop/optional-claims",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/active-directory/develop/active-directory-jwt-claims-customization.md",
515
"redirect_url": "/azure/active-directory/develop/jwt-claims-customization",

articles/active-directory/app-provisioning/on-premises-custom-connector.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,11 +25,18 @@ Azure AD supports preintegrated connectors for applications that support the fol
2525
> - [REST](on-premises-ldap-connector-configure.md)
2626
> - [SOAP](on-premises-ldap-connector-configure.md)
2727
28-
For connectivity to applications that don't support the aforementioned protocols and standards, customers and [partners](https://social.technet.microsoft.com/wiki/contents/articles/1589.fim-2010-mim-2016-management-agents-from-partners.aspx) have built custom [ECMA 2.0](https://learn.microsoft.com/previous-versions/windows/desktop/forefront-2010/hh859557(v=vs.100)) connectors for Microsoft Identity Manager (MIM) 2016. You can now use those ECMA 2.0 connectors with the lightweight Azure AD provisioning agent, without needing MIM sync deployed.
28+
For connectivity to applications that don't support the aforementioned protocols and standards, customers and [partners](https://social.technet.microsoft.com/wiki/contents/articles/1589.fim-2010-mim-2016-management-agents-from-partners.aspx) have built custom [ECMA 2.0](/previous-versions/windows/desktop/forefront-2010/hh859557(v=vs.100)) connectors for Microsoft Identity Manager (MIM) 2016. You can now use those ECMA 2.0 connectors with the lightweight Azure AD provisioning agent, without needing MIM sync deployed. \
29+
30+
31+
32+
## Exporting and importing a MIM connector
33+
If you've got a customer connector in MIM, you can export it by following the instructions [here](on-premises-migrate-microsoft-identity-manager.md#export-a-connector-configuration-from-mim-sync). You need to save the XML file, the DLL, and related software for your connector.
34+
35+
To import your connector, you can use the instructions [here](on-premises-migrate-microsoft-identity-manager.md#import-a-connector-configuration). You will need to copy the DLL for your connector, and any of its prerequisite DLLs, to that same ECMA subdirectory of the Service directory. After the xml has been imported, continue through the wizard and ensure that all the required fields are populated.
2936

3037
## Limitations
3138

32-
Custom connectors built for MIM rely on the [ECMA framework](https://learn.microsoft.com/previous-versions/windows/desktop/forefront-2010/hh859557(v=vs.100)). The following table includes capabilities of the ECMA framework that are either partially supported or not supported by the Azure AD provisioning agent. For a list of known limitations for the Azure AD provisioning service and on-premises application provisioning, see [here](https://learn.microsoft.com/azure/active-directory/app-provisioning/known-issues?pivots=app-provisioning#on-premises-application-provisioning).
39+
Custom connectors built for MIM rely on the [ECMA framework](/previous-versions/windows/desktop/forefront-2010/hh859557(v=vs.100)). The following table includes capabilities of the ECMA framework that are either partially supported or not supported by the Azure AD provisioning agent. For a list of known limitations for the Azure AD provisioning service and on-premises application provisioning, see [here](known-issues.md#on-premises-application-provisioning).
3340

3441

3542
| **Capability / feature** | **Support** | **Comments** |

articles/active-directory/develop/TOC.yml

Lines changed: 19 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@
8484
href: custom-extension-overview.md
8585
- name: Custom claims provider
8686
href: custom-claims-provider-overview.md
87-
- name: Security best practices
87+
- name: Security
8888
displayName: least privilege, secure app configuration, conditional access
8989
items:
9090
- name: Application security
@@ -93,8 +93,22 @@
9393
href: secure-least-privileged-access.md
9494
- name: Secure access control using groups
9595
href: secure-group-access-control.md
96-
- name: Validate claims
97-
href: claims-validation.md
96+
- name: Tokens and claims
97+
items:
98+
- name: Tokens and claims overview
99+
href: security-tokens.md
100+
- name: Access tokens
101+
href: access-tokens.md
102+
- name: Directory extension attributes
103+
href: schema-extensions.md
104+
- name: ID tokens
105+
href: id-tokens.md
106+
- name: Refresh tokens
107+
href: refresh-tokens.md
108+
- name: Token lifetime
109+
href: configurable-token-lifetimes.md
110+
- name: Validate claims
111+
href: claims-validation.md
98112
- name: Zero Trust
99113
href: zero-trust-for-developers.md
100114
- name: Identity platform best practices
@@ -439,7 +453,7 @@
439453
- name: Customize tokens and claims
440454
items:
441455
- name: Configure optional claims
442-
href: active-directory-optional-claims.md
456+
href: optional-claims.md
443457
- name: Configure role claim
444458
href: active-directory-enterprise-app-role-management.md
445459
- name: Customize JWT claims
@@ -448,8 +462,7 @@
448462
href: saml-claims-customization.md
449463
- name: Set an access token lifetime policy
450464
href: configure-token-lifetimes.md
451-
- name: Directory extension attributes
452-
href: active-directory-schema-extensions.md
465+
453466
- name: SAML app multi-instancing
454467
displayName: Configure SAML app multi-instancing for an application
455468
href: reference-app-multi-instancing.md
@@ -799,17 +812,6 @@
799812
href: v2-oauth-ropc.md
800813
- name: OpenID Connect
801814
href: v2-protocols-oidc.md
802-
- name: Security tokens
803-
displayName: bearer, ID token, access token
804-
items:
805-
- name: Access tokens
806-
href: access-tokens.md
807-
- name: ID tokens
808-
href: id-tokens.md
809-
- name: Refresh tokens
810-
href: refresh-tokens.md
811-
- name: Token lifetime
812-
href: configurable-token-lifetimes.md
813815
- name: OAuth 2.0 application types
814816
displayName: App types, OAuth
815817
href: v2-app-types.md

articles/active-directory/develop/access-tokens.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.topic: conceptual
1212
ms.date: 03/29/2023
1313
ms.author: davidmu
14-
ms.custom: aaddev, identityplatformtop40, fasttrack-edit, curation-claims
14+
ms.custom: aaddev, curation-claims
1515
---
1616

1717
# Microsoft identity platform access tokens
@@ -114,6 +114,7 @@ The Microsoft identity platform uses some claims to help secure tokens for reuse
114114
| `uti` | String | Token identifier claim, equivalent to `jti` in the JWT specification. Unique, per-token identifier that is case-sensitive. | |
115115
| `rh` | Opaque String | An internal claim used by Azure to revalidate tokens. Resources shouldn't use this claim. | |
116116
| `ver` | String, either `1.0` or `2.0` | Indicates the version of the access token. | |
117+
| `xms_cc` | JSON array of strings | Indicates whether the client application that acquired the token is capable of handling claims challenges. This claim is commonly used in Conditional Access and Continuous Access Evaluation scenarios. The resource server that the token is issued for controls the presence of the claim in it. For example, a service application. For more information, see [Claims challenges, claims requests and client capabilities](claims-challenge.md?tabs=dotnet). Resource servers should check this claim in access tokens received from client applications. If this claim is present, resource servers can respond back with a claims challenge. The claims challenge requests more claims in a new access token to authorize access to a protected resource. |
117118
118119
#### Groups overage claim
119120

0 commit comments

Comments
 (0)