Skip to content

Commit 375b70d

Browse files
authored
Merge pull request #98207 from MicrosoftDocs/master
12/06 AM Publish
2 parents 8bd8551 + 6e787b1 commit 375b70d

File tree

73 files changed

+545
-377
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+545
-377
lines changed

articles/active-directory-b2c/active-directory-b2c-devquickstarts-graph-dotnet.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -360,6 +360,5 @@ By using `B2CGraphClient`, you have a service application that can manage your B
360360
As you incorporate this functionality into your own application, remember a few key points for B2C applications:
361361

362362
* Grant the application the required permissions in the tenant.
363-
* For now, you need to use ADAL (not MSAL) to get access tokens. (You can also send protocol messages directly, without using a library.)
364363
* When you call the Graph API, use `api-version=1.6`.
365364
* When you create and update consumer users, a few properties are required, as described above.

articles/active-directory/devices/howto-device-identity-virtual-desktop-infrastructure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ If you are relying on a Virtual Machine (VM) snapshot to create additional VMs,
7979
When deploying non-persistent VDI, IT administrators should pay close attention to managing stale devices in Azure AD. Microsoft recommends that IT administrators implement the guidance below. Failure to do so will result in your directory having lots of stale Hybrid Azure AD joined devices that were registered from your non-persistent VDI platform.
8080

8181
- Create and use a prefix for the display name of the computer that indicates the desktop as VDI-based.
82-
- Implement the following commands as part of logoff script. These commands will trigger a best effort call to Azure AD to delete the device.
82+
- Implement the following command as part of logoff script. This command will trigger a best effort call to Azure AD to delete the device.
8383
- For Windows down-level devices – autoworkplace.exe /leave
8484
- Define and implement process for [managing stale devices](manage-stale-devices.md).
8585
- Once you have a strategy to identify your non-persistent Hybrid Azure AD joined devices, you can be more aggressive on the clean-up of these devices to ensure your directory does not get consumed with lots of stale devices.

articles/active-directory/manage-apps/application-provisioning-when-will-provisioning-finish-specific-user.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -99,5 +99,7 @@ Summary of factors that influence the time it takes to complete an **initial cyc
9999

100100
- The number and sizes of assigned groups. Syncing assigned groups takes longer than syncing users. Both the number and the sizes of the assigned groups impact performance. If an application has [mappings enabled for group object sync](customize-application-attributes.md#editing-group-attribute-mappings), group properties such as group names and memberships are synced in addition to users. These additional syncs will take longer than only syncing user objects.
101101

102+
- If performance becomes an issue and you are attempting to provision the majority of users and groups in your tenant, use scoping filters. Scoping filters allow you to fine tune the data that the provisioning service extracts from Azure AD by filtering out users based on specific attribute values. For more information on scoping filters, see [Attribute-based application provisioning with scoping filters](https://docs.microsoft.com/azure/active-directory/manage-apps/define-conditional-rules-for-provisioning-user-accounts).
103+
102104
## Next steps
103105
[Automate user provisioning and deprovisioning to SaaS applications with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-saas-app-provisioning)

articles/active-directory/manage-apps/customize-application-attributes.md

Lines changed: 58 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -74,12 +74,12 @@ Along with this property, attribute-mappings also support the following attribut
7474
- **Only during creation** - Apply this mapping only on user creation actions.
7575

7676
## Matching users in the source and target systems
77-
The Azure AD provisioning service can be deployed in both greenfield (users do not exit in the target system) and brownfield (users already exist in the target system) scenarios. To support both scenarios, the provisioning service uses the concept of matching attribute(s). Matching attribute(s) allow you to determine how to uniquely identify a user in the source and match the user in the target. As part of planning your deployment, identify the attribute that can be used to uniquely identify a user in the source and target systems. Things to note:
77+
The Azure AD provisioning service can be deployed in both "greenfield" scenarios (where users do not exit in the target system) and "brownfield" scenarios (where users already exist in the target system). To support both scenarios, the provisioning service uses the concept of matching attributes. Matching attributes allow you to determine how to uniquely identify a user in the source and match the user in the target. As part of planning your deployment, identify the attribute that can be used to uniquely identify a user in the source and target systems. Things to note:
7878

7979
- **Matching attributes should be unique:** Customers often use attributes such as userPrincipalName, mail, or object ID as the matching attribute.
80-
- **Multiple attributes can be used as matching attributes:** You can define multiple attributes to be evaluated when matching users and the order in which they are evaluated (defined as matching precedence in the UI). If, for example, you define three attributes as matching attributes, and a user is uniquely matched after evaluating the first two attributes, the service will not evaluat the third attribute. The service will evaluate matching attributes in the order specified and stop evaluating when a match is found.
80+
- **Multiple attributes can be used as matching attributes:** You can define multiple attributes to be evaluated when matching users and the order in which they are evaluated (defined as matching precedence in the UI). If, for example, you define three attributes as matching attributes, and a user is uniquely matched after evaluating the first two attributes, the service will not evaluate the third attribute. The service will evaluate matching attributes in the order specified and stop evaluating when a match is found.
8181
- **The value in the source and the target do not have to match exactly:** The value in the target can be some simple function of the value in the source. So, one could have an emailAddress attribute in the source and the userPrincipalName in the target, and match by a function of the emailAddress attribute that replaces some characters with some constant value.
82-
- **Matching based on a combination of attributes is not supported:** Most applications do not support querying based on two properties and therfore it is not possible to match based on a combination of attributes. It is possible to evaluate single properties on after another.
82+
- **Matching based on a combination of attributes is not supported:** Most applications do not support querying based on two properties. Therefore, it is not possible to match based on a combination of attributes. It is possible to evaluate single properties on after another.
8383
- **All users must have a value for at least one matching attribute:** If you define one matching attribute, all users must have a value for that attribute in the source system. If, for example, you define userPrincipalName as the matching attribute, all users must have a userPrincipalName. If you define multiple matching attribute (e.g. extensionAttribute1 and mail), not all users have to have the same matching attribute. One user could have a extensionAttribute1 but not mail while another user could have mail but no extensionAttribute1.
8484
- **The target application must support filtering on the matching attribute:** Application developers allow filtering for a subset of attributes on their user or group API. For applications in the gallery, we ensure that the default attribute mapping is for an attribute that the target application's API does support filtering on. When changing the default matching attribute for the target application, check the third party API documentation to ensure that the attribute can be filtered on.
8585

@@ -130,7 +130,61 @@ When editing the list of supported attributes, the following properties are prov
130130
- **API Expression** - Don't use, unless instructed to do so by the documentation for a specific provisioning connector (such as Workday).
131131
- **Referenced Object Attribute** - If it's a Reference type attribute, then this menu lets you select the table and attribute in the target application that contains the value associated with the attribute. For example, if you have an attribute named "Department" whose stored value references an object in a separate "Departments" table, you would select "Departments.Name". The reference tables and the primary ID fields supported for a given application are pre-configured and currently can't be edited using the Azure portal, but can be edited using the [Graph API](https://developer.microsoft.com/graph/docs/api-reference/beta/resources/synchronization-configure-with-custom-target-attributes).
132132

133-
To add a new attribute, scroll to the end of the list of supported attributes, populate the fields above using the provided inputs, and select **Add Attribute**. Select **Save** when finished adding attributes. You then need to reload the **Provisioning** tab for the new attributes to become available in the attribute-mapping editor.
133+
#### Provisioning a custom extension attribute to a SCIM compliant application
134+
The SCIM RFC defines a core user and group schema, while also allowing for extensions to the schema to meet your application's needs. To add a custom attribute to a SCIM application:
135+
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com), select **Enterprise Applications**, select your application, and then select **Provisioning**.
136+
2. Under **Mappings**, select the object (user or group) for which you'd like to add a custom attribute.
137+
3. At the bottom of the page, select **Show advanced options**.
138+
4. Select **Edit attribute list for *application*.
139+
5. At the bottom of the attribute list, enter information about the custom attribute in the fields provided. Then select **Add Attribute**.
140+
141+
For SCIM applications, the attribute name must follow the pattern shown in the example below. The "CustomExtensionName" and "CustomAttribute" can be customized per your application's requirements, for example: urn:ietf:params:scim:schemas:extension:2.0:CustomExtensionName:CustomAttribute
142+
143+
These instructions are only applicable to SCIM-enabled applications. Applications such as ServiceNow and Salesforce are not integrated with Azure AD using SCIM, and therefore they don't require this specific namespace when adding a custom attribute.
144+
145+
Custom attributes can't be referential attributes or multi-value attributes. Custom multi-value extension attributes are currently supported only for applications in the gallery.
146+
147+
**Example representation of a user with an extension attribute:**
148+
149+
```json
150+
{
151+
"schemas": ["urn:ietf:params:scim:schemas:core:2.0:User",
152+
"urn:ietf:params:scim:schemas:extension:enterprise:2.0:User",
153+
"urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:User"],
154+
"userName":"bjensen",
155+
"externalId":"bjensen",
156+
"name":{
157+
"formatted":"Ms. Barbara J Jensen III",
158+
"familyName":"Jensen",
159+
"givenName":"Barbara"
160+
},
161+
"urn:ietf:params:scim:schemas:extension:enterprise:2.0:User": {
162+
"employeeNumber": "701984",
163+
"costCenter": "4130",
164+
"organization": "Universal Studios",
165+
"division": "Theme Park",
166+
"department": "Tour Operations",
167+
"manager": {
168+
"value": "26118915-6090-4610-87e4-49d8ca9f808d",
169+
"$ref": "../Users/26118915-6090-4610-87e4-49d8ca9f808d",
170+
"displayName": "John Smith"
171+
}
172+
},
173+
"urn:ietf:params:scim:schemas:extension:CustomExtensionName:2.0:CustomAttribute:User": {
174+
"CustomAttribute": "701984",
175+
},
176+
"meta": {
177+
"resourceType": "User",
178+
"created": "2010-01-23T04:56:22Z",
179+
"lastModified": "2011-05-13T04:42:34Z",
180+
"version": "W\/\"3694e05e9dff591\"",
181+
"location":
182+
"https://example.com/v2/Users/2819c223-7f76-453a-919d-413861904646"
183+
}
184+
}
185+
```
186+
187+
134188
## Provisioning a role to a SCIM app
135189
Use the steps below to provision roles for a user to your application. Note that the description below is specific to custom SCIM applications. For gallery applications such as Salesforce and ServiceNow, use the pre-defined role mappings. The bullets below describe how to transform the AppRoleAssignments attribute to the format your application expects.
136190

67.3 KB
Loading

articles/active-directory/privileged-identity-management/pim-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Privileged Identity Management provides time-based and approval-based role activ
4040

4141
Once you set up Privileged Identity Management, you'll see **Tasks**, **Manage**, and **Activity** options in the left navigation menu. As an administrator, you'll choose between managing **Azure AD roles** and **Azure resource** roles. When you choose the type of roles to manage, you see a similar set of options for that role type.
4242

43-
![Screenshot of Privileged Identity Management in the Azure portal](./media/pim-configure/pim-overview.png)
43+
![Screenshot of Privileged Identity Management in the Azure portal](./media/pim-configure/pim-quickstart.png)
4444

4545
## Who can do what?
4646

articles/active-directory/users-groups-roles/directory-admin-roles-secure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ After you have turned on Azure AD Privileged Identity Management:
9090

9191
2. To select the tenant where you want to use Privileged Identity Management, select your user name in the upper right-hand corner of the Azure portal.
9292

93-
3. Select **All services** and filter the list for **Azure AD Privileged Identity Management**.
93+
3. On the Azure portal menu, select **All services** and filter the list for **Azure AD Privileged Identity Management**.
9494

9595
4. Open Privileged Identity Management from the **All services** list and pin it to your dashboard.
9696

@@ -257,7 +257,7 @@ If you’re already using Azure AD Privileged Identity Management, adjust timefr
257257

258258
#### Determine exposure to password-based sign-in protocols (if using Exchange Online)
259259

260-
In the past, protocols assumed that username/password combinations were embedded in devices, email accounts, phones, and so on. But now with the risk for cyber-attacks in the cloud, we recommend you identify every potential user who, if their credentials were compromised, could be catastrophic to the organization, and exclude them from being able to sign in to their email via username/password by implementing strong authentication requirements and Conditional Access. You can block [legacy authentication using Conditional Access](https://docs.microsoft.com/azure/active-directory/conditional-access/block-legacy-authentication). Please check the details on [how to block basic authentication](https://docs.microsoft.com/exchange/clients-and-mobile-in-exchange-online/disable-basic-authentication-in-exchange-online) through Exchnage online.
260+
In the past, protocols assumed that username/password combinations were embedded in devices, email accounts, phones, and so on. But now with the risk for cyber-attacks in the cloud, we recommend you identify every potential user who, if their credentials were compromised, could be catastrophic to the organization, and exclude them from being able to sign in to their email via username/password by implementing strong authentication requirements and Conditional Access. You can block [legacy authentication using Conditional Access](https://docs.microsoft.com/azure/active-directory/conditional-access/block-legacy-authentication). Please check the details on [how to block basic authentication](https://docs.microsoft.com/exchange/clients-and-mobile-in-exchange-online/disable-basic-authentication-in-exchange-online) through Exchange online.
261261

262262
#### Complete a roles review assessment for Office 365 roles (if using Office 365)
263263

articles/active-directory/users-groups-roles/directory-manage-roles-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,11 +21,11 @@ You can now see and manage all the members of the administrator roles in the Azu
2121

2222
## View all roles
2323

24-
In Azure Active Directory, select **Roles and administrators** to see the list of all available roles.
24+
Search for and select **Azure Active Directory**. Select **Roles and administrators** to see the list of all available roles.
2525

2626
Click the ellipsis on the right of each row to open the detailed description of the role.
2727

28-
![list of roles in Azure AD portal](./media/directory-manage-roles-portal/role-list.png)
28+
![list of roles in Azure AD portal](./media/directory-manage-roles-portal/view-roles-in-azure-active-directory.png)
2929

3030
## View my roles
3131

articles/active-directory/users-groups-roles/groups-create-rule.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,10 +43,10 @@ For examples of syntax, supported properties, operators, and values for a member
4343
## To create a group membership rule
4444

4545
1. Sign in to the [Azure AD admin center](https://aad.portal.azure.com) with an account that is in the Global administrator, Intune administrator, or User administrator role in the tenant.
46-
1. Select **Groups**.
46+
1. Search for and select **Groups**.
4747
1. Select **All groups**, and select **New group**.
4848

49-
![Select the command to add new group](./media/groups-create-rule/new-group-creation.png)
49+
![Select the command to add new group](./media/groups-create-rule/create-new-group-azure-active-directory.png)
5050

5151
1. On the **Group** page, enter a name and description for the new group. Select a **Membership type** for either users or devices, and then select **Add dynamic query**. The rule builder supports up to five expressions. To add more than five expressions, you must use the text box.
5252

@@ -84,7 +84,7 @@ The following status messages can be shown for **Membership last updated** statu
8484
- **In Progress**: Updates are currently in progress.
8585
- **Unknown**: The last update time can't be retrieved. The group might be new.
8686

87-
If an error occurs while processing the membership rule for a specific group, an alert is shown on the top of the **Overview page** for the group. If no pending dynamic membership updates can be processed for all the groups within the tenant for more then 24 hours, an alert is shown on the top of **All groups**.
87+
If an error occurs while processing the membership rule for a specific group, an alert is shown on the top of the **Overview page** for the group. If no pending dynamic membership updates can be processed for all the groups within the tenant for more than 24 hours, an alert is shown on the top of **All groups**.
8888

8989
![processing error message alerts](./media/groups-create-rule/processing-error.png)
9090

articles/active-directory/users-groups-roles/licensing-groups-assign.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ In this example, the tenant contains a security group called **HR Department**.
3737

3838
1. Under **All products**, select both Office 365 Enterprise E5 and Enterprise Mobility + Security E3 by selecting the product names. To start the assignment, select **Assign** at the top of the page.
3939

40-
![Select products to assign licenses](./media/licensing-groups-assign/all-products-assign.png)
40+
![Select products to assign licenses](./media/licensing-groups-assign/licenses-all-products-assign.png)
4141

4242
1. On the **Assign license** page, select **Users and groups** to open a list of users and groups.
4343

@@ -85,7 +85,7 @@ When assign licenses to a group, Azure AD processes all existing members of that
8585

8686
1. Select a user to open the user's **Licenses** page. This page shows all licenses that are currently assigned to the user. In this example, the user has the Office 365 Enterprise E1 license that was inherited from the **Kiosk users** group. This conflicts with the E3 license that the system tried to apply from the **HR Department** group. As a result, none of the licenses from that group has been assigned to the user.
8787

88-
![View all license conflicts for a user](./media/licensing-groups-assign/user-license-view.png)
88+
![View all license conflicts for a user](./media/licensing-groups-assign/user-licence-conflicting-service-plans.png)
8989

9090
1. To solve this conflict, remove the user from the **Kiosk users** group. After Azure AD processes the change, the **HR Department** licenses are correctly assigned.
9191

0 commit comments

Comments
 (0)