Skip to content

Commit 224b1f8

Browse files
authored
Merge pull request #250819 from MicrosoftDocs/main
9/8/2023 PM Publish
2 parents b38aedd + 95bbdc9 commit 224b1f8

File tree

138 files changed

+4513
-854
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

138 files changed

+4513
-854
lines changed

articles/active-directory/authentication/concept-authentication-authenticator-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ To use the Authenticator app at a sign-in prompt rather than a username and pass
2626

2727
> [!NOTE]
2828
> - Users don't have the option to register their mobile app when they enable SSPR. Instead, users can register their mobile app at [https://aka.ms/mfasetup](https://aka.ms/mfasetup) or as part of the combined security info registration at [https://aka.ms/setupsecurityinfo](https://aka.ms/setupsecurityinfo).
29-
> - The Authenticator app may not be supported on beta versions of iOS and Android.
29+
> - The Authenticator app may not be supported on beta versions of iOS and Android. In addition, starting October 20th, 2023 the authenticator app on Android will no longer support older verisons of the Android Company Portal. Android users with Company Portal versions below 2111 (5.0.5333.0) will not be able to re-register or register new instances of the authenticator app until they update their Company Portal application to a newer version.
3030
3131
## Passwordless sign-in
3232

articles/active-directory/authentication/concept-certificate-based-authentication-technical-deep-dive.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,14 +47,14 @@ Now we'll walk through each step:
4747

4848
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-alt.png" alt-text="Screenshot of the Sign-in if FIDO2 is also enabled.":::
4949

50-
1. Once the user selects certificate-based authentication, the client is redirected to the certauth endpoint, which is [https://certauth.login.microsoftonline.com](https://certauth.login.microsoftonline.com) for Azure Global. For [Azure Government](../../azure-government/compare-azure-government-global-azure.md#guidance-for-developers), the certauth endpoint is [https://certauth.login.microsoftonline.us](https://certauth.login.microsoftonline.us).
50+
1. Once the user selects certificate-based authentication, the client is redirected to the certauth endpoint, which is [https://certauth.login.microsoftonline.com](https://certauth.login.microsoftonline.com) or [`https://t<tenant id>.certauth.login.microsoftonline.com`](`https://t<tenant id>.certauth.login.microsoftonline.com`) for Azure Global. For [Azure Government](../../azure-government/compare-azure-government-global-azure.md#guidance-for-developers), the certauth endpoint is [https://certauth.login.microsoftonline.us](https://certauth.login.microsoftonline.us).
5151

5252
The endpoint performs TLS mutual authentication, and requests the client certificate as part of the TLS handshake. You'll see an entry for this request in the Sign-ins log.
5353

5454
:::image type="content" border="true" source="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png" alt-text="Screenshot of the Sign-ins log in Azure AD." lightbox="./media/concept-certificate-based-authentication-technical-deep-dive/sign-in-log.png":::
5555

5656
>[!NOTE]
57-
>The network administrator should allow access to the User sign-in page and certauth endpoint for the customer’s cloud environment. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
57+
>The network administrator should allow access to the User sign-in page and certauth endpoint *.certauth.login.microsoftonline.com for the customer’s cloud environment. Disable TLS inspection on the certauth endpoint to make sure the client certificate request succeeds as part of the TLS handshake.
5858
5959
Click the log entry to bring up **Activity Details** and click **Authentication Details**. You'll see an entry for the X.509 certificate.
6060

articles/active-directory/develop/scenario-mobile-app-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -320,7 +320,7 @@ To register a scheme for your app:
320320

321321
Here, `BundleId` uniquely identifies your device. For example, if `BundleId` is `yourcompany.xforms`, your URL scheme is `msauth.com.yourcompany.xforms`.
322322

323-
This URL scheme will become part of the redirect URI that uniquely identifies your app when it receives the broker's response. Make sure that the redirect URI in the format `msauth.(BundleId)://auth` is registered for your application in the [Azure portal](https://portal.azure.com).
323+
This URL scheme will become part of the redirect URI that uniquely identifies your app when it receives the broker's response. Make sure that the redirect URI in the format `msauth.(BundleId)://auth` is registered for your application.
324324

325325
```xml
326326
<key>CFBundleURLTypes</key>

articles/active-directory/external-identities/redemption-experience.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ Sometimes the invited external guest user's email may conflict with an existing
6666

6767
However, the following scenarios should continue to work:
6868
- Redeeming an invitation through an invitation email redemption link using [SAML/WS-Fed IdP](./direct-federation.md), [Email One-Time Passcode](./one-time-passcode.md), and [Google Federation](./google-federation.md) accounts.
69-
- Signing back into an application after redemption process using [SAML/WS-Fed IdP](./direct-federation.md) and [Google Federation](./google-federation.md) accounts.
69+
- Signing back into an application after redemption process using [SAML/WS-Fed IdP](./direct-federation.md), [Email One-Time Passcode](./one-time-passcode.md), and [Google Federation](./google-federation.md) accounts.
7070

7171
To unblock users who can't redeem an invitation due to a conflicting [Contact object](/graph/api/resources/contact), follow these steps:
7272
1. Delete the conflicting Contact object.

articles/active-directory/fundamentals/how-to-customize-branding.md

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Add company branding to your organization's sign-in page
3-
description: Instructions about how to add your organization's branding to the sign-in experience.
3+
description: Instructions about how to add your organization's custom branding to the Azure AD sign-in experience.
44
services: active-directory
55
author: shlipsey3
66
manager: amycolannino
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.workload: identity
1010
ms.subservice: fundamentals
1111
ms.topic: how-to
12-
ms.date: 08/09/2023
12+
ms.date: 08/30/2023
1313
ms.author: sarahlipsey
1414
ms.reviewer: almars
1515
---
@@ -23,8 +23,7 @@ The default sign-in experience is the global look and feel that applies across a
2323
> [!NOTE]
2424
> Instructions for how to manage the **'Stay signed in prompt?'** can be found in the **[Manage the 'Stay signed in?' prompt](how-to-manage-stay-signed-in-prompt.md)** article.
2525
26-
27-
## License requirements
26+
## Prerequisites
2827

2928
Adding custom branding requires one of the following licenses:
3029

@@ -48,18 +47,23 @@ The **Global Administrator** role is required to customize company branding.
4847

4948
The branding elements are called out in the following example. Text descriptions are provided following the image.
5049

51-
:::image type="content" source="media/how-to-customize-branding/company-branding-map.png" alt-text="Screenshot of the sign-in page, with each of the company branding elements highlighted." lightbox="media/how-to-customize-branding/company-branding-map-large.png":::
50+
:::image type="content" source="media/how-to-customize-branding/sign-in-page-map.png" alt-text="Screenshot of the sign-in page, with each of the company branding elements highlighted." lightbox="media/how-to-customize-branding/sign-in-page-map-expanded.png":::
5251

5352
1. **Favicon**: Small icon that appears on the left side of the browser tab.
54-
1. **Header logo**: Space across the top of the web page, below the web browser navigation area.
53+
1. **Header**: Space across the top of the sign-in page, behind the header log.
54+
1. **Header logo**: Logo that appears in the upper-left corner of the sign-in page.
5555
1. **Background image**: The entire space behind the sign-in box.
5656
1. **Page background color**: The entire space behind the sign-in box.
57-
1. **Banner logo**: The logo that appears in the upper-left corner of the sign-in box.
57+
1. **Banner logo**: Logo that appears at the top of the sign-in box
58+
1. **Sign-in page title**: Larger text that appears below the banner logo.
59+
1. **Sign-in page description**: Text to describe the sign-in page.
5860
1. **Username hint and text**: The text that appears before a user enters their information.
59-
1. **Sign-in page text**: Text you can add below the username field.
6061
1. **Self-service password reset**: A link you can add below the sign-in page text for password resets.
62+
1. **Sign-in page text**: Text you can add below the username field.
63+
1. **Footer link: Privacy & Cookies**: Link you can add to the lower-right corner for privacy information.
64+
1. **Footer: Terms of Use**: Text in the lower-right corner of the page where you can add Terms of use information.
65+
1. **Footer**: Space across the bottom of the page for privacy and Terms of Use information.
6166
1. **Template**: The layout of the page and sign-in boxes.
62-
1. **Footer**: Text in the lower-right corner of the page where you can add Terms of use or privacy information.
6367

6468
### User experience
6569

@@ -78,16 +82,19 @@ In the following examples, replace the contoso.com with your own tenant name, or
7882
- For my app portal `https://myapps.microsoft.com/?whr=contoso.com`
7983
- Self-service password reset `https://passwordreset.microsoftonline.com/?whr=contoso.com`
8084

81-
> [!NOTE]
82-
> To manage the settings of the 'Stay signed in?' prompt, go to **Azure AD** > **Users** > **User settings**.
85+
For B2B collaboration end-users who perform cross-tenant sign-ins, their home tenant branding appears, even if there isn't custom branding specified.
86+
87+
In the following example, the company branding for Woodgrove Groceries appears on the left. The example on the right displays the default branding for the user's home tenant.
88+
89+
![Comparison of the branded sign-in experience and the default sign-in experience](media/how-to-customize-branding/b2b-comparison.png)
8390

8491
## How to navigate the company branding process
8592

8693
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
8794

88-
1. Sign in to the [Azure portal](https://portal.azure.com) using a Global Administrator account for the directory.
95+
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator for the directory.
8996

90-
2. Go to **Azure Active Directory** > **Company branding** > **Customize**.
97+
2. Browse to **Azure Active Directory** > **Company branding** > **Customize**.
9198
- If you currently have a customized sign-in experience, the **Edit** button is available.
9299

93100
![Custom branding landing page with 'Company branding' highlighted in the side menu and 'Configure' button highlighted in the center of the page](media/how-to-customize-branding/customize-branding-getting-started.png)
@@ -156,13 +163,10 @@ If you haven't enabled the footer, go to the **Layout** section and select **Sho
156163

157164
To begin a new paragraph, use the enter key twice. You can also change text formatting to include bold, italics, an underline, or clickable link. Use the following syntax to add formatting to text:
158165

159-
> Hyperlink: `[text](link)`
160-
161-
> Bold: `**text**` or `__text__`
162-
163-
> Italics: `*text*` or `_text_`
164-
165-
> Underline: `++text++`
166+
- Hyperlink: `[text](link)`
167+
- Bold: `**text**` or `__text__`
168+
- Italics: `*text*` or `_text_`
169+
- Underline: `++text++`
166170

167171
> [!IMPORTANT]
168172
> Hyperlinks that are added to the sign-in page text render as text in native environments, such as desktop and mobile applications.
488 KB
Loading

0 commit comments

Comments
 (0)