You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# B2B collaboration user claims mapping in Azure Active Directory
20
20
21
-
Azure Active Directory (Azure AD) supports customizing the claims that are issued in the SAML token for B2B collaboration users. When a user authenticates to the application, Azure AD issues a SAML token to the app that contains information (or claims) about the user that uniquely identifies them. By default, this includes the user's user name, email address, first name, and last name.
21
+
Azure Active Directory (Azure AD) supports customizing the claims that are issued in the SAML token for [B2B collaboration](what-is-b2b.md) users. When a user authenticates to the application, Azure AD issues a SAML token to the app that contains information (or claims) about the user that uniquely identifies them. By default, this claim includes the user's user name, email address, first name, and last name.
22
22
23
23
In the [Azure portal](https://portal.azure.com), you can view or edit the claims that are sent in the SAML token to the application. To access the settings, select **Azure Active Directory** > **Enterprise applications** > the application that's configured for single sign-on > **Single sign-on**. See the SAML token settings in the **User Attributes** section.
24
24
25
-

25
+
:::image type="content" source="media/claims-mapping/view-claims-in-saml-token-attributes.png" alt-text="Screenshot of the SAML token attributes in the UI.":::
26
26
27
27
There are two possible reasons why you might need to edit the claims that are issued in the SAML token:
28
28
29
29
1. The application requires a different set of claim URIs or claim values.
30
30
31
-
2. The application requires the NameIdentifier claim to be something other than the user principal name (UPN) that's stored in Azure AD.
31
+
2. The application requires the NameIdentifier claim to be something other than the user principal name [(UPN)](../hybrid/plan-connect-userprincipalname.md#what-is-userprincipalname) that's stored in Azure AD.
32
32
33
33
For information about how to add and edit claims, see [Customizing claims issued in the SAML token for enterprise applications in Azure Active Directory](../develop/active-directory-saml-claims-customization.md).
Copy file name to clipboardExpand all lines: articles/communication-services/concepts/pricing.md
+18-3Lines changed: 18 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,8 +82,8 @@ Alice is a Dynamics 365 contact center agent, who makes an outbound call from Om
82
82
**Cost calculations**
83
83
84
84
- One participant on the VoIP leg (Alice) from Omnichannel for Customer Service client application x 10 minutes x $0.004 per participant leg per minute = $0.04
85
-
- One participant on the Communication Services direct routing outbound leg (Bob) from Communication Services servers to an SBC x 10 minutes x $0.004 per participant leg per minute = $0.04.
86
-
- Omnichannel for Customer Service bot does not introduce additional ACS charges.
85
+
- One participant on the Communication Services direct routing outbound leg (Bob) from Communication Services servers to an SBC x 10 minutes x $0.004 per participant leg per minute = $0.04
86
+
- Omnichannel for Customer Service bot doesn't introduce extra ACS charges.
87
87
88
88
**Total cost for the call**: $0.04 + $0.04 = $0.08
89
89
@@ -99,7 +99,7 @@ Alice and Bob are on a VOIP Call. Bob escalated the call to Charlie on Charlie's
99
99
- Two participants on the VoIP leg (Alice and Bob) from App to Communication Services servers x 20 minutes x $0.004 per participant leg per minute = $0.16
100
100
- One participant on the PSTN outbound leg (Charlie) from Communication Services servers to US Telephone number x 10 minutes x $0.013 per participant leg per minute = $0.13
101
101
102
-
Note: USA mixed rates to `+1-425` is $0.013. Refer to the following link for details: https://github.com/Azure/Communication/blob/master/pricing/communication-services-pstn-rates.csv)
102
+
Note: USA mixed rate to `+1-425` is $0.013. Refer to the following link for details: https://github.com/Azure/Communication/blob/master/pricing/communication-services-pstn-rates.csv)
103
103
104
104
**Total cost for the VoIP + escalation call**: $0.16 + $0.13 = $0.29
105
105
@@ -120,6 +120,21 @@ Note that the service application that uses Call Automation SDK isn't charged to
120
120
121
121
**Total cost for the call**: $0.22 + $0.02 = $0.24
122
122
123
+
### Pricing example: Inbound PSTN call redirected to another external telephone number using Call Automation SDK
124
+
125
+
Vlad dials your toll-free number (that you acquired from Communication Service) from his mobile phone. Your service application (built with Call Automation SDK) receives the call, and invokes the logic to redirect the call to a mobile phone number of Abraham using ACS direct routing. Abraham picks up the call and they talk with Vlad for 5 minutes.
126
+
127
+
- Vlad was on the call as a PSTN endpoint for a total of 5 minutes.
128
+
- Your service application was on the call for the entire 5 minutes of the call.
129
+
- Abraham was on the call as a direct routing endpoint for a total of 5 minutes.
130
+
131
+
**Cost calculations**
132
+
133
+
- Inbound PSTN leg by Vlad to toll-free number acquired from Communication Services x 5 minutes x $0.0220 per minute for receiving the call = $0.11
134
+
- One participant on the ACS direct routing outbound leg (Abraham) from the service application to an SBC x 5 minutes x $0.004 per participant leg per minute = $0.02
135
+
136
+
The service application that uses Call Automation SDK isn't charged to be part of the call. The additional monthly cost of leasing a US toll-free number isn't included in this calculation.
137
+
123
138
## Call Recording
124
139
125
140
Azure Communication Services allow developers to record PSTN, WebRTC, Conference, or SIP calls. Call Recording supports mixed video MP4, mixed audio MP3/WAV, and unmixed audio WAV output formats. Call Recording SDKs are available for Java and C#. To learn more view Call Recording [concepts](./voice-video-calling/call-recording.md) and [quickstart](../quickstarts/voice-video-calling/get-started-call-recording.md).
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-cloud-glossary.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,7 +115,7 @@ This glossary provides a brief description of important terms and concepts for t
115
115
## T
116
116
| Term | Description | Learn more |
117
117
|--|--|--|
118
-
|**TVM**|Threat and Vulnerability Management, a built-in module in Microsoft Defender for Endpoint that can discover vulnerabilities and misconfigurations in near real time and prioritize vulnerabilities based on the threat landscape and detections in your organization.|[Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-tvm.md)
118
+
|**TVM**|Threat and Vulnerability Management, a built-in module in Microsoft Defender for Endpoint that can discover vulnerabilities and misconfigurations in near real time and prioritize vulnerabilities based on the threat landscape and detections in your organization.|[Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-cloud-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,7 +95,7 @@ Learn more about connecting your [AWS](quickstart-onboard-aws.md) and [GCP](quic
95
95
96
96
Defender for Cloud includes vulnerability assessment solutions for your virtual machines, container registries, and SQL servers as part of the enhanced security features. Some of the scanners are powered by Qualys. But you don't need a Qualys license, or even a Qualys account - everything's handled seamlessly inside Defender for Cloud.
97
97
98
-
Microsoft Defender for Servers includes automatic, native integration with Microsoft Defender for Endpoint. Learn more, [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md). With this integration enabled, you'll have access to the vulnerability findings from **Microsoft threat and vulnerability management**. Learn more in [Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-tvm.md).
98
+
Microsoft Defender for Servers includes automatic, native integration with Microsoft Defender for Endpoint. Learn more, [Protect your endpoints with Defender for Cloud's integrated EDR solution: Microsoft Defender for Endpoint](integration-defender-for-endpoint.md). With this integration enabled, you'll have access to the vulnerability findings from **Microsoft threat and vulnerability management**. Learn more in [Investigate weaknesses with Microsoft Defender for Endpoint's threat and vulnerability management](deploy-vulnerability-assessment-defender-vulnerability-management.md).
99
99
100
100
Review the findings from these vulnerability scanners and respond to them all from within Defender for Cloud. This broad approach brings Defender for Cloud closer to being the single pane of glass for all of your cloud security efforts.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/defender-for-servers-introduction.md
+2-5Lines changed: 2 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,9 +38,10 @@ The following table summarizes what's included in each plan.
38
38
|:---|:---|:---:|:---:|
39
39
|**Unified view**| The Defender for Cloud portal displays Defender for Endpoint alerts. You can then drill down into Defender for Endpoint portal, with additional information such as the alert process tree, the incident graph, and a detailed machine timeline showing historical data up to six months.| :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
40
40
|**Automatic MDE provisioning**| Automatic provisioning of Defender for Endpoint on Azure, AWS, and GCP resources. | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
41
-
|**Microsoft threat and vulnerability management**| Discover vulnerabilities and misconfigurations in real time with Microsoft Defender for Endpoint, without needing other agents or periodic scans. [Learn more](deploy-vulnerability-assessment-tvm.md). | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
41
+
|**Microsoft Defender Vulnerability Management**| Discover vulnerabilities and misconfigurations in real time with Microsoft Defender for Endpoint, without other agents or periodic scans. [Learn more](deploy-vulnerability-assessment-defender-vulnerability-management.md). | :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
42
42
|**Threat detection for OS-level (Agent-based)**| Defender for Servers and Microsoft Defender for Endpoint (MDE) detect threats at the OS level, including VM behavioral detections and **Fileless attack detection**, which generates detailed security alerts that accelerate alert triage, correlation, and downstream response time.<br>[Learn more](alerts-reference.md#alerts-windows)| :::image type="icon" source="./media/icons/yes-icon.png"::: | :::image type="icon" source="./media/icons/yes-icon.png"::: |
43
43
|**Threat detection for network-level (Agentless)**| Defender for Servers detects threats directed at the control plane on the network, including network-based detections for Azure virtual machines. || :::image type="icon" source="./media/icons/yes-icon.png"::: |
44
+
|**Microsoft Defender Vulnerability Management Add-on**| See a deeper analysis of the security posture of your protected servers, including risks related to browser extensions, network shares, and digital certificates. [Learn more](deploy-vulnerability-assessment-defender-vulnerability-management.md). || :::image type="icon" source="./media/icons/yes-icon.png"::: |
44
45
|**Security Policy and Regulatory Compliance**| Customize a security policy for your subscription and also compare the configuration of your resources with requirements in industry standards, regulations, and benchmarks. || :::image type="icon" source="./media/icons/yes-icon.png"::: |
45
46
|**Integrated vulnerability assessment powered by Qualys**| Use the Qualys scanner for real-time identification of vulnerabilities in Azure and hybrid VMs. Everything's handled by Defender for Cloud. You don't need a Qualys license or even a Qualys account. [Learn more](deploy-vulnerability-assessment-vm.md). || :::image type="icon" source="./media/icons/yes-icon.png"::: |
46
47
|**Log Analytics 500 MB free data ingestion**| Defender for Cloud leverages Azure Monitor to collect data from Azure VMs and servers, using the Log Analytics agent. || :::image type="icon" source="./media/icons/yes-icon.png"::: |
@@ -49,10 +50,6 @@ The following table summarizes what's included in each plan.
49
50
|**Just-in-time VM access for management ports**| Defender for Cloud provides [JIT access](just-in-time-access-overview.md), locking down machine ports to reduce the machine's attack surface.|| :::image type="icon" source="./media/icons/yes-icon.png"::: |
50
51
|**Adaptive network hardening**| Filtering traffic to and from resources with network security groups (NSG) improves your network security posture. You can further improve security by [hardening the NSG rules](adaptive-network-hardening.md) based on actual traffic patterns. || :::image type="icon" source="./media/icons/yes-icon.png"::: |
51
52
|**Docker host hardening**| Defender for Cloud assesses containers hosted on Linux machines running Docker containers, and compares them with the Center for Internet Security (CIS) Docker Benchmark. [Learn more](harden-docker-hosts.md). || :::image type="icon" source="./media/icons/yes-icon.png"::: |
> If you only enable Defender for Cloud at the workspace level, Defender for Cloud won't enable just-in-time VM access, adaptive application controls, and network detections for Azure resources.
0 commit comments