Skip to content

Commit 1baad41

Browse files
committed
TOC merge conflict
2 parents c225334 + 5049c2a commit 1baad41

File tree

61 files changed

+1039
-661
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+1039
-661
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17436,6 +17436,11 @@
1743617436
"redirect_url": "/azure/storage/files/storage-troubleshoot-windows-file-connection-problems",
1743717437
"redirect_document_id": false
1743817438
},
17439+
{
17440+
"source_path": "articles/storage/common/storage-account-container-recovery.md",
17441+
"redirect_url": "/azure/storage/common/storage-redundancy",
17442+
"redirect_document_id": false
17443+
},
1743917444
{
1744017445
"source_path": "articles/storage/common/storage-quickstart-create-storage-account-cli.md",
1744117446
"redirect_url": "/azure/storage/common/storage-quickstart-create-account?tabs=azure-cli",
97.1 KB
Loading

articles/active-directory/b2b/redemption-experience.md

Lines changed: 31 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,36 @@ There are some cases where the invitation email is recommended over a direct lin
5151
- Sometimes the invited user object may not have an email address because of a conflict with a contact object (for example, an Outlook contact object). In this case, the user must click the redemption URL in the invitation email.
5252
- The user may sign in with an alias of the email address that was invited. (An alias is an additional email address associated with an email account.) In this case, the user must click the redemption URL in the invitation email.
5353

54+
## Invitation redemption flow
55+
56+
When a user clicks the **Accept invitation** link in an [invitation email](invitation-email-elements.md), Azure AD automatically redeems the invitation based on the redemption flow as shown below:
57+
58+
![Screenshot showing the redemption flow diagram](media/redemption-experience/invitation-redemption-flow.png)
59+
60+
1. The redemption process checks if the user has an existing personal [Microsoft account (MSA)](https://support.microsoft.com/help/4026324/microsoft-account-how-to-create).
61+
62+
2. If an admin has enabled [direct federation](direct-federation.md), Azure AD checks if the user’s domain suffix matches the domain of a configured SAML/WS-Fed identity provider and redirects the user to the pre-configured identity provider.
63+
64+
3. If an admin has enabled [Google federation](google-federation.md), Azure AD checks if the user’s domain suffix is gmail.com or googlemail.com and redirects the user to Google.
65+
66+
4. Azure AD performs user-based discovery to determine if the user exists in an [existing Azure AD tenant](what-is-b2b.md#easily-add-guest-users-in-the-azure-ad-portal).
67+
68+
5. Once the user’s **home directory** is identified, the user is sent to the corresponding identity provider to sign in.
69+
70+
6. If steps 1 to 4 fail to find a home directory for the invited user, Azure AD determines whether the inviting tenant has enabled the [Email one-time passcode (OTP)](one-time-passcode.md) feature for guests.
71+
72+
7. If [Email one-time passcode for guests is enabled](one-time-passcode.md#when-does-a-guest-user-get-a-one-time-passcode), a passcode is sent to the user through the invited email. The user will retrieve and enter this passcode in the Azure AD sign-in page.
73+
74+
8. If Email one-time passcode for guests is disabled, Azure AD checks the domain suffix against a consumer domain list maintained by Microsoft. If the domain matches any domain on the consumer domain list, the user is prompted to create a personal Microsoft account. If not, the user is prompted to create an [Azure AD self-service account](../users-groups-roles/directory-self-service-signup.md) (viral account).
75+
76+
9. Azure AD attempts to create an Azure AD self-service account (viral account) by verifying access to the email. Verifying the account is done by sending a code to the email, and having the user retrieve and submit it to Azure AD. However, if the invited user’s tenant is federated or if the AllowEmailVerifiedUsers field is set to false in the invited user’s tenant, the user is unable to complete the redemption and the flow results in an error. For more information, refer to [Troubleshooting Azure Active Directory B2B collaboration](troubleshoot.md#the-user-that-i-invited-is-receiving-an-error-during-redemption).
77+
78+
10. The user is prompted to create a personal Microsoft account (MSA).
79+
80+
11. After authenticating to the right identity provider, the user is redirected to Azure AD to complete the [consent experience](redemption-experience.md#consent-experience-for-the-guest).
81+
82+
For just-in-time (JIT) redemptions, where redemption is through a tenanted application link, steps 8 through 10 are not available. If a user reaches step 6 and the Email one-time passcode feature is not enabled, the user receives an error message and is unable to redeem the invitation. To prevent this, admins should either [enable Email one-time passcode](one-time-passcode.md#when-does-a-guest-user-get-a-one-time-passcode) or ensure the user clicks an invitation link.
83+
5484
## Consent experience for the guest
5585

5686
When a guest signs in to access resources in a partner organization for the first time, they're guided through the following pages.
@@ -66,8 +96,7 @@ When a guest signs in to access resources in a partner organization for the firs
6696

6797
![Screenshot showing new terms of use](media/redemption-experience/terms-of-use-accept.png)
6898

69-
> [!NOTE]
70-
> You can configure see [terms of use](../governance/active-directory-tou.md) in **Manage** > **Organizational relationships** > **Terms of use**.
99+
You can configure see [terms of use](../governance/active-directory-tou.md) in **Manage** > **Organizational relationships** > **Terms of use**.
71100

72101
3. Unless otherwise specified, the guest is redirected to the Apps access panel, which lists the applications the guest can access.
73102

articles/active-directory/hybrid/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ landingContent:
5454
url: whatis-phs.md
5555
- text: What is passthrough authentication?
5656
url: how-to-connect-pta.md
57-
- text: What is federtation?
57+
- text: What is federation?
5858
url: whatis-fed.md
5959
- text: What is single sign-on?
6060
url: how-to-connect-sso.md
@@ -100,4 +100,4 @@ landingContent:
100100

101101

102102

103-
103+

articles/active-directory/saas-apps/aws-multi-accounts-tutorial.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.subservice: saas-app-tutorial
1313
ms.workload: identity
1414
ms.tgt_pltfrm: na
1515
ms.topic: article
16-
ms.date: 04/03/2020
16+
ms.date: 04/16/2020
1717
ms.author: jeedes
1818

1919
ms.collection: M365-identity-device-management
@@ -33,7 +33,7 @@ If you want to know more details about SaaS app integration with Azure AD, see [
3333
![Amazon Web Services (AWS) in the results list](./media/aws-multi-accounts-tutorial/amazonwebservice.png)
3434

3535
> [!NOTE]
36-
> Please note connecting one AWS app to all your AWS accounts is not our recommended approach. Instead we recommend you to use [this](https://docs.microsoft.com/azure/active-directory/saas-apps/amazon-web-service-tutorial) approach to configure multiple instances of AWS account to Multiple instances of AWS apps in Azure AD. You should only use [this](https://docs.microsoft.com/azure/active-directory/saas-apps/amazon-web-service-tutorial) approach if you have very less number of AWS Accounts and Roles in it. [this](https://docs.microsoft.com/azure/active-directory/saas-apps/amazon-web-service-tutorial) model is not scalable as the AWS accounts and roles inside these accounts grows. Also [this](https://docs.microsoft.com/azure/active-directory/saas-apps/amazon-web-service-tutorial) approach does not use AWS Role import functionality using Azure AD User Provisioning and so you have to manually add/update/delete the roles. For other limitations on [this](https://docs.microsoft.com/azure/active-directory/saas-apps/amazon-web-service-tutorial) approach please see the details below.
36+
> Please note connecting one AWS app to all your AWS accounts is not our recommended approach. Instead we recommend you to use [this](https://docs.microsoft.com/azure/active-directory/saas-apps/amazon-web-service-tutorial) approach to configure multiple instances of AWS account to Multiple instances of AWS apps in Azure AD. You should only use this approach if you have very less number of AWS Accounts and Roles in it, this model is not scalable as the AWS accounts and roles inside these accounts grows. Also this approach does not use AWS Role import functionality using Azure AD User Provisioning and so you have to manually add/update/delete the roles. For other limitations on this approach please see the details below.
3737
3838
**Please note that we do not recommend to use this approach for following reasons:**
3939

articles/active-directory/saas-apps/highground-tutorial.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -81,15 +81,15 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
8181
1. On the **Basic SAML Configuration** section, if you wish to configure the application in **IDP** initiated mode, enter the values for the following fields:
8282

8383
a. In the **Identifier** text box, type a URL using the following pattern:
84-
`https://<SUBDOMAIN>.highground.com/`
84+
`https://app.highground.com/`
8585

8686
b. In the **Reply URL** text box, type a URL using the following pattern:
87-
`https://<SUBDOMAIN>.highground.com/svc/SSONoAuth/<companyName>`
87+
`https://app.highground.com/svc/SSONoAuth/SAML?groupid=<company-guid>`
8888

8989
1. Click **Set additional URLs** and perform the following step if you wish to configure the application in **SP** initiated mode:
9090

9191
In the **Sign-on URL** text box, type a URL using the following pattern:
92-
`https://app.highground.com/#/login/<companyName>`
92+
`https://app.highground.com/#/login/<company-slug>`
9393

9494
> [!NOTE]
9595
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign-on URL. Contact [HighGround Client support team](https://youearnedit.freshdesk.com/support/home) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
-36.2 KB
Loading
-22.3 KB
Loading
-18.3 KB
Loading
-15.5 KB
Loading

0 commit comments

Comments
 (0)