Skip to content

Commit 2bf1b93

Browse files
authored
Merge pull request #219941 from MicrosoftDocs/main
11/30 AM Publish
2 parents 6c8fedc + 892b4a9 commit 2bf1b93

File tree

133 files changed

+2050
-1777
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

133 files changed

+2050
-1777
lines changed

.openpublishing.redirection.defender-for-iot.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -142,12 +142,12 @@
142142
},
143143
{
144144
"source_path_from_root": "/articles/defender-for-iot/how-to-create-and-manage-users.md",
145-
"redirect_url": "/azure/defender-for-iot/organizations/how-to-create-and-manage-users",
145+
"redirect_url": "/azure/defender-for-iot/organizations/manage-users-overview",
146146
"redirect_document_id": false
147147
},
148148
{
149149
"source_path_from_root": "/articles/defender-for-iot/how-to-define-global-user-access-control.md",
150-
"redirect_url": "/azure/defender-for-iot/organizations/how-to-define-global-user-access-control",
150+
"redirect_url": "/azure/defender-for-iot/organizations/manage-users-on-premises-management-console#define-global-access-permission-for-on-premises-users",
151151
"redirect_document_id": false
152152
},
153153
{

.openpublishing.redirection.healthcare-apis.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -554,6 +554,10 @@
554554
"redirect_url": "/azure/healthcare-apis/iot/how-to-use-iot-jsonpath-content-mappings",
555555
"redirect_document_id": false
556556
},
557+
{ "source_path_from_root": "/articles/healthcare-apis/iot/deploy-08-new-ps-cli.md",
558+
"redirect_url": "/azure/healthcare-apis/iot/deploy-new-powershell-cli",
559+
"redirect_document_id": false
560+
},
557561
{ "source_path_from_root": "/articles/healthcare-apis/events/events-display-metrics.md",
558562
"redirect_url": "/azure/healthcare-apis/events/events-use-metrics",
559563
"redirect_document_id": false

articles/active-directory/authentication/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -310,8 +310,12 @@
310310
href: /samples/browse/?products=azure
311311
- name: Azure PowerShell cmdlets
312312
href: /powershell/azure/
313-
- name: Microsoft Graph REST API beta
313+
- name: Authentication methods APIs - Microsoft Graph
314314
href: /graph/api/resources/authenticationmethods-overview
315+
- name: Authentication strengths APIs - Microsoft Graph (preview)
316+
href: /graph/api/resources/authenticationstrengths-overview
317+
- name: Authentication methods policy - Microsoft Graph
318+
href: /graph/api/resources/authenticationmethodspolicies-overview
315319
- name: Service limits and restrictions
316320
href: ../enterprise-users/directory-service-limits-restrictions.md
317321
- name: FIDO2 compatibility

articles/active-directory/external-identities/api-connectors-overview.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: conceptual
8-
ms.date: 06/16/2020
8+
ms.date: 11/28/2022
99

1010
ms.author: mimart
1111
author: msmimart
1212
manager: celestedg
1313
ms.custom: "it-pro"
14-
ms.collection: M365-identity-device-management
14+
ms.collection: engagement-fy23, M365-identity-device-management
1515
---
1616

1717
# Use API connectors to customize and extend self-service sign-up
@@ -25,7 +25,7 @@ As a developer or IT administrator, you can use [API connectors](self-service-si
2525
- **Overwrite user attributes**. Reformat or assign a value to an attribute collected from the user. For example, if a user enters the first name in all lowercase or all uppercase letters, you can format the name with only the first letter capitalized.
2626
- **Run custom business logic**. You can trigger downstream events in your cloud systems to send push notifications, update corporate databases, manage permissions, audit databases, and perform other custom actions.
2727

28-
An API connector provides Azure Active Directory with the information needed to call API endpoint by defining the HTTP endpoint URL and authentication for the API call. Once you configure an API connector, you can enable it for a specific step in a user flow. When a user reaches that step in the sign up flow, the API connector is invoked and materializes as an HTTP POST request to your API, sending user information ("claims") as key-value pairs in a JSON body. The API response can affect the execution of the user flow. For example, the API response can block a user from signing up, ask the user to re-enter information, or overwrite and append user attributes.
28+
An API connector provides Azure Active Directory with the information needed to call API endpoint by defining the HTTP endpoint URL and authentication for the API call. Once you configure an API connector, you can enable it for a specific step in a user flow. When a user reaches that step in the sign-up flow, the API connector is invoked and materializes as an HTTP POST request to your API, sending user information ("claims") as key-value pairs in a JSON body. The API response can affect the execution of the user flow. For example, the API response can block a user from signing up, ask the user to reenter information, or overwrite and append user attributes.
2929

3030
## Where you can enable an API connector in a user flow
3131

@@ -39,7 +39,7 @@ There are two places in a user flow where you can enable an API connector:
3939
4040
### After federating with an identity provider during sign-up
4141

42-
An API connector at this step in the sign-up process is invoked immediately after the user authenticates with an identity provider (like Google, Facebook, & Azure AD). This step precedes the ***attribute collection page***, which is the form presented to the user to collect user attributes. This step is not invoked if a user is registering with a local account. The following are examples of API connector scenarios you might enable at this step:
42+
An API connector at this step in the sign-up process is invoked immediately after the user authenticates with an identity provider (like Google, Facebook, & Azure AD). This step precedes the [***attribute collection page***](self-service-sign-up-user-flow.md#select-the-layout-of-the-attribute-collection-form), which is the form presented to the user to collect user attributes. This step isn't invoked if a user is registering with a local account. The following are examples of API connector scenarios you might enable at this step:
4343

4444
- Use the email or federated identity that the user provided to look up claims in an existing system. Return these claims from the existing system, pre-fill the attribute collection page, and make them available to return in the token.
4545
- Implement an allow or blocklist based on social identity.
@@ -55,4 +55,5 @@ An API connector at this step in the sign-up process is invoked after the attrib
5555

5656
## Next steps
5757
- Learn how to [add an API connector to a user flow](self-service-sign-up-add-api-connector.md)
58+
- Learn about [Azure AD entitlement management](self-service-portal.md)
5859
- Learn how to [add a custom approval system to self-service sign-up](self-service-sign-up-add-approvals.md)

articles/active-directory/external-identities/self-service-portal.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: conceptual
8-
ms.date: 02/12/2020
8+
ms.date: 11/25/2022
99

1010
ms.author: mimart
1111
author: msmimart
1212
manager: celestedg
1313

14-
ms.collection: M365-identity-device-management
14+
ms.collection: engagement-fy23, M365-identity-device-management
1515
---
1616

1717
# Self-service for Azure AD B2B collaboration sign-up
@@ -20,14 +20,14 @@ Customers can do a lot with the built-in features that are exposed through the [
2020

2121
## Azure AD entitlement management for B2B guest user sign-up
2222

23-
As an inviting organization, you might not know ahead of time who the individual external collaborators are who need access to your resources. You need a way for users from partner companies to sign themselves up with policies that you control. If you want to enable users from other organizations to request access, and upon approval be provisioned with guest accounts and assigned to groups, apps and SharePoint Online sites, you can use [Azure AD entitlement management](../governance/entitlement-management-overview.md) to configure policies that [manage access for external users](../governance/entitlement-management-external-users.md#how-access-works-for-external-users).
23+
As an inviting organization, you might not know ahead of time who the individual external collaborators are who need access to your resources. You need a way for users from partner companies to sign themselves up with policies that you control. You can use [Azure AD entitlement management](../governance/entitlement-management-overview.md) to configure policies, which [manage access for external users](../governance/entitlement-management-external-users.md#how-access-works-for-external-users). This will enable users from other organizations to request access, and upon approval be provisioned with guest accounts and assigned to groups, apps and SharePoint Online sites.
2424

2525
## Azure Active Directory B2B invitation API
2626

2727
Organizations can use the [Microsoft Graph invitation manager API](/graph/api/resources/invitation) to build their own onboarding experiences for B2B guest users. When you want to offer self-service B2B guest user sign-up, we recommend that you use [Azure AD entitlement management](../governance/entitlement-management-overview.md). But if you want to build your own experience, you can use the [create invitation API](/graph/api/invitation-post?tabs=http) to automatically send your customized invitation email directly to the B2B user, for example. Or your app can use the inviteRedeemUrl returned in the creation response to craft your own invitation (through your communication mechanism of choice) to the invited user.
2828

2929
## Next steps
3030

31-
* [What is Azure AD B2B collaboration?](what-is-b2b.md)
32-
* [External Identities pricing](external-identities-pricing.md)
33-
* [Azure Active Directory B2B collaboration frequently asked questions (FAQ)](faq.yml)
31+
- [Self-service sign-up user flows](self-service-sign-up-overview.md)
32+
- [What is Azure AD B2B collaboration?](what-is-b2b.md)
33+
- [External Identities pricing](external-identities-pricing.md)

articles/active-directory/fundamentals/resilience-b2b-authentication.md

Lines changed: 12 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -3,21 +3,18 @@ title: Build resilience in external user authentication with Azure Active Direct
33
description: A guide for IT admins and architects to building resilient authentication for external users
44
services: active-directory
55
author: janicericketts
6-
manager: amycolannino
76
ms.service: active-directory
87
ms.workload: identity
98
ms.subservice: fundamentals
109
ms.topic: conceptual
11-
ms.date: 09/13/2022
10+
ms.date: 11/16/2022
1211
ms.author: jricketts
13-
ms.reviewer: ajburnle
1412
ms.custom: "it-pro, seodec18"
1513
ms.collection: M365-identity-device-management
1614
---
17-
1815
# Build resilience in external user authentication
1916

20-
[Azure Active Directory B2B collaboration](../external-identities/what-is-b2b.md) (Azure AD B2B) is a feature of [External Identities](../external-identities/external-collaboration-settings-configure.md) that enables collaboration with other organizations and individuals. It enables the secure onboarding of guest users into your Azure AD tenant without having to manage their credentials. External users bring their identity and credentials with them from an external identity provider (IdP), so they dont have to remember a new credential.
17+
[Azure Active Directory B2B collaboration](../external-identities/what-is-b2b.md) (Azure AD B2B) is a feature of [External Identities](../external-identities/external-collaboration-settings-configure.md) that enables collaboration with other organizations and individuals. It enables the secure onboarding of guest users into your Azure AD tenant without having to manage their credentials. External users bring their identity and credentials with them from an external identity provider (IdP) so they don't have to remember a new credential.
2118

2219
## Ways to authenticate external users
2320

@@ -26,46 +23,38 @@ You can choose the methods of external user authentication to your directory. Yo
2623
With every external IdP, you take a dependency on the availability of that IdP. With some methods of connecting to IdPs, there are things you can do to increase your resilience.
2724

2825
> [!NOTE]
29-
> Azure AD B2B has the built-in ability to authenticate any user from any [Azure Active Directory](../index.yml) tenant, or with a personal [Microsoft Account](https://account.microsoft.com/account). You do not have to do any configuration with these built-in options.
26+
> Azure AD B2B has the built-in ability to authenticate any user from any [Azure Active Directory](../index.yml) tenant or with a personal [Microsoft Account](https://account.microsoft.com/account). You do not have to do any configuration with these built-in options.
3027
3128
### Considerations for resilience with other IdPs
3229

33-
When using external IdPs for guest user authentication, there are certain configurations that you must ensure you maintain to prevent disruptions.
30+
When you use external IdPs for guest user authentication, there are configurations that you must maintain to prevent disruptions.
3431

3532
| Authentication Method| Resilience considerations |
3633
| - | - |
3734
| Federation with social IDPs like [Facebook](../external-identities/facebook-federation.md) or [Google](../external-identities/google-federation.md).| You must maintain your account with the IdP and configure your Client ID and Client Secret. |
38-
| [Direct Federation with SAML and WS-Federation Identity Providers](../external-identities/direct-federation.md)| You must collaborate with the IdP owner for access to their endpoints, upon which you're dependent. <br>You must maintain the metadata that contain the certificates and endpoints. |
39-
| [Email one-time passcode](../external-identities/one-time-passcode.md)| With this method you're dependent on Microsoft’s email system, the user’s email system, and the user’s email client. |
40-
41-
42-
35+
| [SAML/WS-Fed identity provider (IdP) federation](../external-identities/direct-federation.md)| You must collaborate with the IdP owner for access to their endpoints upon which you're dependent. You must maintain the metadata that contain the certificates and endpoints. |
36+
| [Email one-time passcode](../external-identities/one-time-passcode.md)| You're dependent on Microsoft's email system, the user's email system, and the user's email client. |
4337

44-
## Self-service sign-up (preview)
38+
## Self-service sign-up
4539

46-
As an alternative to sending invitations or links, you can enable [Self-service sign-up](../external-identities/self-service-sign-up-overview.md). This allows external users to request access to an application. You must create an [API connector](../external-identities/self-service-sign-up-add-api-connector.md) and associate it with a user flow. You associate user flows that define the user experience with one or more applications.
40+
As an alternative to sending invitations or links, you can enable [Self-service sign-up](../external-identities/self-service-sign-up-overview.md). This method allows external users to request access to an application. You must create an [API connector](../external-identities/self-service-sign-up-add-api-connector.md) and associate it with a user flow. You associate user flows that define the user experience with one or more applications.
4741

48-
Its possible to use [API connectors](../external-identities/api-connectors-overview.md) to integrate your self-service sign-up user flow with external systems APIs. This API integration can be used for [custom approval workflows](../external-identities/self-service-sign-up-add-approvals.md), [performing identity verification](../external-identities/code-samples-self-service-sign-up.md), and other tasks such as overwriting user attributes. Using APIs requires that you manage the following dependencies.
42+
It's possible to use [API connectors](../external-identities/api-connectors-overview.md) to integrate your self-service sign-up user flow with external systems' APIs. This API integration can be used for [custom approval workflows](../external-identities/self-service-sign-up-add-approvals.md), [performing identity verification](../external-identities/code-samples-self-service-sign-up.md), and other tasks such as overwriting user attributes. Using APIs requires that you manage the following dependencies.
4943

5044
* **API Connector Authentication**: Setting up a connector requires an endpoint URL, a username, and a password. Set up a process by which these credentials are maintained, and work with the API owner to ensure you know any expiration schedule.
51-
5245
* **API Connector Response**: Design API Connectors in the sign-up flow to fail gracefully if the API isn't available. Examine and provide to your API developers these [example API responses](../external-identities/self-service-sign-up-add-api-connector.md) and the [best practices for troubleshooting](../external-identities/self-service-sign-up-add-api-connector.md). Work with the API development team to test all possible response scenarios, including continuation, validation-error, and blocking responses.
5346

5447
## Next steps
55-
Resilience resources for administrators and architects
48+
49+
### Resilience resources for administrators and architects
5650

5751
* [Build resilience with credential management](resilience-in-credentials.md)
58-
5952
* [Build resilience with device states](resilience-with-device-states.md)
60-
6153
* [Build resilience by using Continuous Access Evaluation (CAE)](resilience-with-continuous-access-evaluation.md)
62-
6354
* [Build resilience in your hybrid authentication](resilience-in-hybrid.md)
64-
6555
* [Build resilience in application access with Application Proxy](resilience-on-premises-access.md)
6656

67-
Resilience resources for developers
57+
### Resilience resources for developers
6858

6959
* [Build IAM resilience in your applications](resilience-app-development-overview.md)
70-
7160
* [Build resilience in your CIAM systems](resilience-b2c.md)

0 commit comments

Comments
 (0)