Skip to content

Commit 1dbf6fa

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 0c9bcba + e288040 commit 1dbf6fa

File tree

310 files changed

+3069
-905
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

310 files changed

+3069
-905
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -816,6 +816,7 @@
816816
".openpublishing.redirection.security-benchmark.json",
817817
".openpublishing.redirection.synapse-analytics.json",
818818
".openpublishing.redirection.azure-web-pubsub.json",
819+
".openpublishing.redirection.azure-percept.json",
819820
"articles/azure-fluid-relay/.openpublishing.redirection.fluid-relay.json",
820821
"articles/azure-netapp-files/.openpublishing.redirection.azure-netapp-files.json",
821822
"articles/azure-relay/.openpublishing.redirection.relay.json",
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/azure-percept/how-to-select-update-package.md",
5+
"redirect_url": "/azure/azure-percept/how-to-determine-your-update-strategy",
6+
"redirect_document_id": false
7+
}
8+
]
9+
}

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5733,11 +5733,6 @@
57335733
"redirect_url": "/azure/azure-arc/data/create-data-controller-direct-cli",
57345734
"redirect_document_id": false
57355735
},
5736-
{
5737-
"source_path_from_root": "/articles/azure-arc/data/create-data-controller-direct-cli.md",
5738-
"redirect_url": "/azure/azure-arc/data/create-data-controller-direct-prerequisites",
5739-
"redirect_document_id": false
5740-
},
57415736
{
57425737
"source_path_from_root": "/articles/azure-arc/data/create-data-controller.md",
57435738
"redirect_url": "/azure/azure-arc/data/plan-azure-arc-data-services",

articles/active-directory/devices/hybrid-azuread-join-manual.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -53,17 +53,18 @@ Azure AD Connect:
5353

5454
Make sure that the following URLs are accessible from computers inside your organization's network for registration of computers to Azure AD:
5555

56-
* `https://enterpriseregistration.windows.net`
57-
* `https://login.microsoftonline.com`
58-
* `https://device.login.microsoftonline.com`
59-
* Your organization's STS (for federated domains), which should be included in the user's local intranet settings
56+
- `https://enterpriseregistration.windows.net`
57+
- `https://login.microsoftonline.com`
58+
- `https://device.login.microsoftonline.com`
59+
- Your organization's Security Token Service (STS) (For federated domains)
60+
- `https://autologon.microsoftazuread-sso.com` (If you use or plan to use seamless SSO)
6061

6162
> [!WARNING]
62-
> If your organization uses proxy servers that intercept SSL traffic for scenarios like data loss prevention or Azure AD tenant restrictions, ensure that traffic to 'https://device.login.microsoftonline.com' is excluded from TLS break-and-inspect. Failure to exclude 'https://device.login.microsoftonline.com' may cause interference with client certificate authentication, causing issues with device registration and device-based Conditional Access.
63+
> If your organization uses proxy servers that intercept SSL traffic for scenarios like data loss prevention or Azure AD tenant restrictions, ensure that traffic to these URLs are excluded from TLS break-and-inspect. Failure to exclude these URLs may cause interference with client certificate authentication, cause issues with device registration, and device-based Conditional Access.
6364
64-
If your organization plans to use Seamless SSO, the following URL needs to be reachable from the computers inside your organization. It must also be added to the user's local intranet zone.
65+
If your organization plans to use Seamless SSO, the following URL must be added to the user's local intranet zone.
6566

66-
* `https://autologon.microsoftazuread-sso.com`
67+
- `https://autologon.microsoftazuread-sso.com`
6768

6869
Also, the following setting should be enabled in the user's intranet zone: "Allow status bar updates via script."
6970

@@ -625,4 +626,4 @@ If you experience issues completing hybrid Azure AD join for domain-joined Windo
625626
* [Introduction to device management in Azure Active Directory](overview.md)
626627

627628
<!--Image references-->
628-
[1]: ./media/hybrid-azuread-join-manual/12.png
629+
[1]: ./media/hybrid-azuread-join-manual/12.png

articles/active-directory/hybrid/reference-connect-version-history.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -315,7 +315,7 @@ You can use these cmdlets to retrieve the TLS 1.2 enablement status, or set it a
315315
- Some Active Directory connectors may be installed in a different order when using the output of the migrate settings script to install the product.
316316
- The User Sign In options page in the Azure AD Connect wizard mentions "Company Administrator". This term is no longer used and needs to be replace by "Global Administrator".
317317
- The "Export settings" option is broken when the Sign In option has been configured to use PingFederate.
318-
- While Azure AD Connect can now be deployed using the Hybrid Identity Administrator role, configuring Self Service Password Reset or Single Sign On will still require user with the Global Administrator role.
318+
- While Azure AD Connect can now be deployed using the Hybrid Identity Administrator role, configuring Self Service Password Reset, Passthru Authentication or Single Sign On will still require user with the Global Administrator role.
319319
- When importing the AADConnect configuration while deploying to connect with a different tenant than the original AADConnect configuration, directory extension attributes are not configured correctly.
320320

321321
## 1.6.4.0
Lines changed: 91 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,91 @@
1+
---
2+
title: Overview of consent and permissions
3+
titleSuffix: Azure AD
4+
description: Learn about the fundamental concepts of consents and permissions in Azure AD
5+
services: active-directory
6+
author: davidmu1
7+
manager: CelesteDG
8+
ms.service: active-directory
9+
ms.subservice: app-mgmt
10+
ms.workload: identity
11+
ms.topic: overview
12+
ms.date: 11/16/2021
13+
ms.author: davidmu
14+
ms.reviewer: phsignor
15+
ms.collection: M365-identity-device-management
16+
---
17+
18+
# Consent and permissions overview
19+
20+
In this article, you’ll learn the foundational concepts and scenarios around consent and permissions in Azure Active Directory (Azure AD).
21+
22+
Consent is a process where a user can grant permission for an application to access a protected resource. To indicate the level of access required, an application requests the API permissions it requires. For example, an application can request the permission to see the signed-in user's profile and read the contents of the user's mailbox.
23+
24+
Consent can be initiated in various ways. For example, a user can be prompted for consent when they attempt to sign in to an application for the first time. Depending on the permissions they require, some applications may require an administrator to be the one who grants consent.
25+
26+
## User consent
27+
28+
A user can authorize an application to access some data at the protected resource, while acting as that user. The permissions that allow this type of access are called "delegated permissions".
29+
30+
User consent is usually initiated while a user signs in to an application. After the user has provided their credentials, they are checked to determine whether consent has already been granted. If no previous record of user or admin consent for the required permissions exists, the user is directed to the consent prompt window to grant the application the requested permissions.
31+
32+
User consent by non-administrators is only possible in organizations where user consent is allowed for the application, and for the set of permissions the application requires. If user consent is disabled, or if the user isn't allowed to consent for the requested permissions, the user won't be prompted for consent. If the user is allowed to consent and the user accepts the permissions requested, consent is recorded and the user usually doesn't have to consent again on future sign-ins to the same application.
33+
34+
### User consent settings
35+
36+
Users are in control of their data. A privileged administrator can configure whether non-administrator users are allowed to grant user consent to an application. This setting can take into account aspects of the application and the application's publisher, and the permissions being requested.
37+
38+
As an administrator, you can choose whether user consent is allowed. If you choose to allow user consent, you can choose what conditions must be met before an application can be consented to by a user.
39+
40+
By choosing which application consent policies apply for all users, you can set limits on when users are allowed to grant consent to applications, and when they’ll be required to request administrator review and approval. Some built-in options are available in the Azure portal:
41+
42+
- Disable user consent - Users can't grant permissions to applications. Users continue to sign into applications they had previously consented to, or applications that administrators have granted consent to on their behalf, but they'll not be allowed to consent to new permissions to applications on their own. Only users who have been granted a directory role that includes the permission to grant consent can consent to new applications.
43+
- Users can consent to applications from verified publishers or your organization, but only for permissions you select - All users can only consent to applications that were published by a [verified publisher](/develop/publisher-verification-overview.md) and applications that are registered in your tenant. Users can only consent to the permissions you have classified as "low impact". You must [classify permissions](configure-permission-classifications.md) to select which permissions users are allowed to consent to.
44+
- Users can consent to all applications - This option allows all users to consent to any permission that doesn't require admin consent, for any application.
45+
46+
For most organizations, one of the built-in options will be appropriate. Advanced customers who want more options over the conditions that govern when one is allowed to consent, can [create custom app consent policy](manage-app-consent-policies.md#create-a-custom-app-consent-policy), and configure those policies to apply for user consent.
47+
48+
## Admin consent
49+
50+
During admin consent, a privileged administrator may grant an application access on behalf of other users (usually, on behalf of the entire organization). During admin consent, applications or services direct access to an API, which can be used by the application if there's no signed-in user.
51+
52+
When your organization purchases a license or subscription for a new application, you may proactively want to set up the application so that all users in the organization can use it. To avoid the need for user consent, an administrator can grant consent for the application on behalf of all users in the organization.
53+
54+
Usually, once an administrator grants admin consent on behalf of the organization, users aren't prompted for consent for that application. In certain cases, a user may be prompted for consent even after consent was granted by an administrator. For example, if an application requests another permission that the administrator hasn't already granted.
55+
56+
Granting admin consent on behalf of the organization is a sensitive operation, potentially allowing the application's publisher access to significant portions of your organization's data, or the permission to do highly privileged operations. For example, role management, full access to all mailboxes or all sites, and full user impersonation.
57+
58+
Before granting tenant-wide admin consent, you must ensure you trust the application and the application publisher, for the level of access you're granting. If you aren't confident you understand who controls the application and why the application is requesting the permissions, don't grant consent.
59+
60+
See [Evaluating a request for tenant-wide admin consent](manage-consent-requests.md#evaluating-a-request-for-tenant-wide-admin-consent) for step-by-step guidance for evaluating whether you should grant an application admin consent.
61+
62+
See [Grant tenant-wide admin consent](grant-admin-consent.md) to an application for step-by-step instructions for granting tenant-wide admin consent from the Azure portal.
63+
64+
### Grant consent on behalf of a specific user
65+
66+
Instead of granting consent for the entire organization, an admin can also use the [Microsoft Graph API](/graph/use-the-api) to grant consent to delegated permissions on behalf of a single user. See [Grant consent on behalf of a single user using PowerShell](manage-consent-requests.md) for a detailed example using Microsoft Graph PowerShell.
67+
### Limiting users' access to an application
68+
69+
Users' access to applications can still be limited even when tenant-wide admin consent has been granted. Configure the application’s properties to require user assignment to limit user access to the application. [See methods for assigning users and groups](assign-user-or-group-access-portal.md).
70+
71+
For a broader overview including how to handle other complex scenarios, see using [Azure AD for application access management](what-is-access-management.md).
72+
73+
## Admin consent workflow
74+
75+
The admin consent workflow gives users a way to request admin consent for applications when they aren't allowed to consent themselves. When the admin consent workflow is enabled, a user is presented with an approval required dialog box to request admin approval for access to the application.
76+
77+
After the user submits the admin consent request, the admins who've been designated as reviewers receive notifications. The user is notified after a reviewer has acted on their request. See [configure admin consent workflow](configure-admin-consent-workflow.md) for step-by-step instructions for configuring the admin consent workflow using the Azure portal.
78+
79+
### How users request admin consent
80+
81+
After the admin consent workflow is enabled, users can request admin approval for an application they're unauthorized to consent to. The following steps describe the user's experience when they request approval:
82+
83+
- The user attempts to sign into the application.
84+
- The Approval required message appears. The user types a justification for needing access to the application, and then selects Request approval.
85+
- A Request sent message confirms that the request was submitted to the admin. If the user sends several requests, only the first request is submitted to the admin.
86+
- The user receives an email notification when their request is approved, denied, or blocked.
87+
88+
## Next steps
89+
90+
- [Configure user consent settings](configure-user-consent.md)
91+
- [Configure the admin consent workflow](configure-admin-consent-workflow.md)

articles/active-directory/manage-apps/f5-aad-integration.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -136,16 +136,14 @@ The following tutorials provide detailed guidance on implementing some of the mo
136136

137137
- [F5 BIG-IP APM and Azure AD SSO to Kerberos applications](../saas-apps/kerbf5-tutorial.md#configure-f5-single-sign-on-for-kerberos-application)
138138

139-
- [F5 BIG-IP APM and Azure AD SSO to Header-based applications](../saas-apps/headerf5-tutorial.md#configure-f5-single-sign-on-for-header-based-application)
139+
- [F5 BIG-IP APM and Azure AD SSO to Header-based applications](f5-big-ip-header-advanced.md)
140140

141141
- [Securing F5 BIG-IP SSL-VPN with Azure AD SHA](f5-aad-password-less-vpn.md)
142142

143143
- [Configure Azure AD B2C with F5 BIG-IP](../../active-directory-b2c/partner-f5.md)
144144

145145
- [F5 BIG-IP APM and Azure AD SSO to forms-based applications](f5-big-ip-forms-advanced.md)
146146

147-
- [Integrate Azure Active Directory SSO with F5 BIG-IP for header-based authentication](f5-big-ip-header-advanced.md)
148-
149147
## Additional resources
150148

151149
- [The end of passwords, go passwordless](https://www.microsoft.com/security/business/identity/passwordless)

0 commit comments

Comments
 (0)