You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/active-directory-b2c-reference-custom-attr.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.author: davidmu
18
18
Your Azure Active Directory (Azure AD) B2C directory comes with a built-in set of information (attributes): Given Name, Surname, City, Postal Code, and other attributes. However, every consumer-facing application has unique requirements on what attributes to gather from consumers. With Azure AD B2C, you can extend the set of attributes stored on each consumer account. You can create custom attributes on the [Azure portal](https://portal.azure.com/) and use it in your sign-up policies, as shown below. You can also read and write these attributes by using the [Azure AD Graph API](active-directory-b2c-devquickstarts-graph-dotnet.md).
19
19
20
20
> [!NOTE]
21
-
> Custom attributes use [Azure AD Graph API Directory Schema Extensions](https://msdn.microsoft.com/library/azure/dn720459.aspx).
21
+
> Custom attributes use [Azure AD Graph API Directory Schema Extensions](https://msdn.microsoft.com/library/azure/ad/graph/howto/azure-ad-graph-api-directory-schema-extensions).
Copy file name to clipboardExpand all lines: articles/active-directory/active-directory-reporting-migration.md
+3-31Lines changed: 3 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,14 +21,7 @@ ms.reviewer: dhanyahk
21
21
22
22
In this article, we describe how to find Azure Active Directory user activity reports in the Azure portal.
23
23
24
-
## What's new
25
-
26
-
Reports in the Azure classic portal were separated into categories:
27
-
* Security reports
28
-
* Activity reports
29
-
* Integrated app reports
30
-
31
-
### Activity and integrated app reports
24
+
## Activity and integrated app reports
32
25
33
26
For context-based reporting in the Azure portal, existing reports are merged into a single view. A single, underlying API provides the data to the view.
34
27
@@ -85,7 +78,7 @@ To view details about application usage for all apps or for a single app, under
85
78
86
79
#### Azure AD anomalous activity reports
87
80
88
-
Azure AD anomalous activity security reports from the Azure classic portal have been consolidated to provide you with one, central view. This view shows all security-related risk events that Azure AD can detect and report on.
81
+
Azure AD anomalous activity security reports are consolidated to provide you with one central view. This view shows all security-related risk events that Azure AD can detect and report on.
89
82
90
83
The following table lists the Azure AD anomalous activity security reports, and corresponding risk event types in the Azure portal.
91
84
@@ -103,8 +96,6 @@ The following Azure AD anomalous activity security reports are not included as r
103
96
* Sign-ins after multiple failures
104
97
* Sign-ins from multiple geographies
105
98
106
-
These reports are still available in the Azure classic portal, but they will be deprecated at some time in the future.
107
-
108
99
For more information, see
109
100
[Azure Active Directory risk events](active-directory-identity-protection-risk-events.md).
110
101
@@ -124,29 +115,10 @@ For more information about security reports, see:
124
115
-[Risky Sign-ins report in the Azure Active Directory portal](active-directory-reporting-security-risky-sign-ins.md)
125
116
126
117
127
-
## Activity reports in the Azure classic portal vs. the Azure portal
128
-
129
-
The table in this section lists existing reports in the Azure classic portal. It also describes how you can get the same information in the Azure portal.
130
-
131
-
To view all auditing data, on the **Azure Active Directory** blade, under **ACTIVITY**, go to **Audit logs**.
| Self-service groups activity | For **Activity Category**, select **Self-service Group Management**. |
141
-
| Account provisioning activity | For **Activity Category**, select **Account User Provisioning**. |
142
-
| Password rollover status | For **Activity Category**, select **Automatic App Password Rollover**. |
143
-
| Account provisioning errors | For **Activity Category**, select **Account User Provisioning**. |
144
-
| Office365 Group Name Changes | For **Activity Category**, select **Self-service Password Management**. For **Activity Resource Type**, select **Group**. For **Activity Source**, select **O365 groups**.|
145
-
146
118
To view the **Application Usage** report, on the **Azure Active Directory** blade, under **MANAGE**, select **Enterprise Applications**, and then select **Sign-ins**.

120
120
121
121
6. On the **Asana Configuration** section, click **Configure Asana** to open **Configure sign-on** window. Copy the **SAML Single Sign-On Service URL** from the **Quick Reference section.**
7. In a different browser window, sign-on to your Asana application. To configure SSO in Asana, access the workspace settings by clicking the workspace name on the top right corner of the screen. Then, click on **\<your workspace name\> Settings**.
124
126
125
-
7. In a different browser window, sign-on to your Asana application. To configure SSO in Asana, access the workspace settings by clicking the workspace name on the top right corner of the screen. Then, click on **\<your workspace name\> Settings**.
8. On the **Organization settings** window, click **Administration**. Then, click **Members must log in via SAML** to enable the SSO configuration. The perform the following steps:
130
-
130
+
131
131

132
132
133
133
a. In the **Sign-in page URL** textbox, paste the **SAML Single Sign-On Service URL**.
@@ -136,9 +136,6 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
136
136
137
137
9. Click **Save**. Go to [Asana guide for setting up SSO](https://asana.com/guide/help/premium/authentication#gl-saml) if you need further assistance.
138
138
139
-
> [!TIP]
140
-
> You can now read a concise version of these instructions inside the [Azure portal](https://portal.azure.com), while you are setting up the app! After adding this app from the **Active Directory > Enterprise Applications** section, simply click the **Single Sign-On** tab and access the embedded documentation through the **Configuration** section at the bottom. You can read more about the embedded documentation feature here: [Azure AD embedded documentation](https://go.microsoft.com/fwlink/?linkid=845985)
141
-
142
139
### Create an Azure AD test user
143
140
144
141
The objective of this section is to create a test user in the Azure portal called Britta Simon.
@@ -152,16 +149,16 @@ The objective of this section is to create a test user in the Azure portal calle
152
149

153
150
154
151
2. To display the list of users, go to **Users and groups** and click **All users**.
155
-
156
-

152
+
153
+

157
154
158
155
3. To open the **User** dialog, click **Add** on the top of the dialog.
159
-
160
-

156
+
157
+

161
158
162
159
4. On the **User** dialog page, perform the following steps:
@@ -170,14 +167,18 @@ The objective of this section is to create a test user in the Azure portal calle
170
167
c. Select **Show Password** and write down the value of the **Password**.
171
168
172
169
d. Click **Create**.
173
-
170
+
174
171
### Create an Asana test user
175
172
173
+
The objective of this section is to create a user called Britta Simon in Asana. Asana supports automatic user provisioning, which is by default enabled. You can find more details [here](active-directory-saas-asana-provisioning-tutorial.md) on how to configure automatic user provisioning.
174
+
175
+
**If you need to create user manually, please perform following steps:**
176
+
176
177
In this section, you create a user called Britta Simon in Asana.
177
178
178
-
1. On **Asana**, go to the **Teams** section on the left panel. Click the plus sign button.
179
-
180
-

179
+
1. On **Asana**, go to the **Teams** section on the left panel. Click the plus sign button.
180
+
181
+

181
182
182
183
2. Type the email [email protected] in the text box and then select **Invite**.
183
184
@@ -193,11 +194,11 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
193
194
194
195
1. In the Azure portal, open the applications view, and then navigate to the directory view and go to **Enterprise applications** then click **All applications**.
195
196
196
-
![Assign User][201]
197
+
![Assign User][201]
197
198
198
199
2. In the applications list, select **Asana**.
199
200
200
-

201
+

201
202
202
203
3. In the menu on the left, click **Users and groups**.
203
204
@@ -212,7 +213,7 @@ In this section, you enable Britta Simon to use Azure single sign-on by granting
212
213
6. Click **Select** button on **Users and groups** dialog.
213
214
214
215
7. Click **Assign** button on **Add Assignment** dialog.
215
-
216
+
216
217
### Test single sign-on
217
218
218
219
The objective of this section is to test your Azure AD single sign-on.
@@ -223,7 +224,7 @@ Go to Asana login page. In the Email address textbox, insert the email address b
223
224
224
225
*[List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory](active-directory-saas-tutorial-list.md)
225
226
*[What is application access and single sign-on with Azure Active Directory?](manage-apps/what-is-single-sign-on.md)
226
-
227
+
*[Configure User Provisioning](active-directory-saas-asana-provisioning-tutorial.md)
227
228
228
229
<!--Image references-->
229
230
@@ -239,4 +240,4 @@ Go to Asana login page. In the Email address textbox, insert the email address b
0 commit comments