Skip to content

Commit 39f5429

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into episode-twenty
2 parents 948236c + 9bfa396 commit 39f5429

File tree

800 files changed

+7685
-4338
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

800 files changed

+7685
-4338
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,12 @@
164164
"branch": "dev",
165165
"branch_mapping": {}
166166
},
167+
{
168+
"path_to_root": "functions-quickstart-templates-v1",
169+
"url": "https://github.com/Azure/azure-functions-templates",
170+
"branch": "v1.x",
171+
"branch_mapping": {}
172+
},
167173
{
168174
"path_to_root": "azure-functions-samples-java",
169175
"url": "https://github.com/Azure-Samples/azure-functions-samples-java",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,11 @@
130130
"redirect_url": "/azure/aks/monitor-aks",
131131
"redirect_document_id": false
132132
},
133+
{
134+
"source_path_from_root": "/articles/aks/workload-identity-migration-sidecar.md",
135+
"redirect_url": "/azure/aks/workload-identity-migrate-from-pod-identity",
136+
"redirect_document_id": false
137+
},
133138
{
134139
"source_path": "articles/api-management/zone-redundancy.md",
135140
"redirect_url": "/azure/availability-zones/migrate-api-mgt",

articles/active-directory-b2c/aad-sspr-technical-profile.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/23/2020
12+
ms.date: 11/08/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -26,8 +26,6 @@ This technical profile:
2626
- Uses the Azure AD SSPR service to generate and send a code to an email address, and then verifies the code.
2727
- Validates an email address via a verification code.
2828

29-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
30-
3129
## Protocol
3230

3331
The **Name** attribute of the **Protocol** element needs to be set to `Proprietary`. The **handler** attribute must contain the fully qualified name of the protocol handler assembly that is used by Azure AD B2C:

articles/active-directory-b2c/custom-policy-developer-notes.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 06/27/2022
12+
ms.date: 11/08/2022
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -22,7 +22,9 @@ Azure Active Directory B2C [user flows and custom policies](user-flow-overview.m
2222
## Terms for features in public preview
2323

2424
- We encourage you to use public preview features for evaluation purposes only.
25+
2526
- [Service level agreements (SLAs)](https://azure.microsoft.com/support/legal/sla/active-directory-b2c) don't apply to public preview features.
27+
2628
- Support requests for public preview features can be submitted through regular support channels.
2729

2830
## User flows
@@ -156,7 +158,7 @@ The following table summarizes the Security Assertion Markup Language (SAML) app
156158
| ------- | :--: | ----- |
157159
| [MFA using time-based one-time password (TOTP) with authenticator apps](multi-factor-authentication.md#verification-methods) | GA | Users can use any authenticator app that supports TOTP verification, such as the [Microsoft Authenticator app](https://www.microsoft.com/security/mobile-authenticator-app).|
158160
| [Phone factor authentication](phone-factor-technical-profile.md) | GA | |
159-
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | Preview | |
161+
| [Azure AD MFA authentication](multi-factor-auth-technical-profile.md) | GA | |
160162
| [One-time password](one-time-password-technical-profile.md) | GA | |
161163
| [Azure Active Directory](active-directory-technical-profile.md) as local directory | GA | |
162164
| [Predicate validations](predicates.md) | GA | For example, password complexity. |

articles/active-directory-b2c/multi-factor-auth-technical-profile.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 12/09/2021
12+
ms.date: 11/08/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -18,7 +18,6 @@ ms.subservice: B2C
1818

1919
Azure Active Directory B2C (Azure AD B2C) provides support for verifying a phone number by using a verification code, or verifying a Time-based One-time Password (TOTP) code.
2020

21-
[!INCLUDE [b2c-public-preview-feature](../../includes/active-directory-b2c-public-preview.md)]
2221

2322
## Protocol
2423

articles/active-directory-b2c/self-asserted-technical-profile.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 02/17/2022
12+
ms.date: 11/07/2022
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -50,8 +50,6 @@ In a self-asserted technical profile, you can use the **InputClaims** and **Inpu
5050

5151
## Display claims
5252

53-
The display claims feature is currently in **preview**.
54-
5553
The **DisplayClaims** element contains a list of claims to be presented on the screen for collecting data from the user. To prepopulate the values of display claims, use the input claims that were previously described. The element may also contain a default value.
5654

5755
The order of the claims in **DisplayClaims** specifies the order in which Azure AD B2C renders the claims on the screen. To force the user to provide a value for a specific claim, set the **Required** attribute of the **DisplayClaim** element to `true`.
@@ -133,7 +131,7 @@ Use output claims when:
133131
- **Claims are output by output claims transformation**.
134132
- **Setting a default value in an output claim** without collecting data from the user or returning the data from the validation technical profile. The `LocalAccountSignUpWithLogonEmail` self-asserted technical profile sets the **executed-SelfAsserted-Input** claim to `true`.
135133
- **A validation technical profile returns the output claims** - Your technical profile may call a validation technical profile that returns some claims. You may want to bubble up the claims and return them to the next orchestration steps in the user journey. For example, when signing in with a local account, the self-asserted technical profile named `SelfAsserted-LocalAccountSignin-Email` calls the validation technical profile named `login-NonInteractive`. This technical profile validates the user credentials and also returns the user profile. Such as 'userPrincipalName', 'displayName', 'givenName' and 'surName'.
136-
- **A display control returns the output claims** - Your technical profile may have a reference to a [display control](display-controls.md). The display control returns some claims, such as the verified email address. You may want to bubble up the claims and return them to the next orchestration steps in the user journey. The display control feature is currently in **preview**.
134+
- **A display control returns the output claims** - Your technical profile may have a reference to a [display control](display-controls.md). The display control returns some claims, such as the verified email address. You may want to bubble up the claims and return them to the next orchestration steps in the user journey.
137135

138136
The following example demonstrates the use of a self-asserted technical profile that uses both display claims and output claims.
139137

articles/active-directory/conditional-access/overview.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: overview
9-
ms.date: 08/05/2022
9+
ms.date: 11/07/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -93,6 +93,10 @@ Risk-based policies require access to [Identity Protection](../identity-protecti
9393

9494
Other products and features that may interact with Conditional Access policies require appropriate licensing for those products and features.
9595

96+
When licenses required for Conditional Access expire, policies aren't automatically disabled or deleted so customers can migrate away from Conditional Access policies without a sudden change in their security posture. Remaining policies can be viewed and deleted, but no longer updated.
97+
98+
[Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) help protect against identity-related attacks and are available for all customers.
99+
96100
## Next steps
97101

98102
- [Building a Conditional Access policy piece by piece](concept-conditional-access-policies.md)

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -183,6 +183,8 @@
183183
href: app-resilience-continuous-access-evaluation.md
184184
- name: Claims challenges and requests
185185
href: claims-challenge.md
186+
- name: Configure app instance property lock
187+
href: howto-configure-app-instance-property-locks.md
186188
- name: Test
187189
items:
188190
- name: Build a test environment

articles/active-directory/develop/active-directory-saml-protocol-reference.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 10/27/2021
12+
ms.date: 11/4/2022
1313
ms.author: kenwith
14-
ms.custom: aaddev
14+
ms.custom: aaddev, engagement-fy23
1515
ms.reviewer: paulgarn
1616
---
1717

@@ -23,14 +23,17 @@ The SAML protocol requires the identity provider (Microsoft identity platform) a
2323

2424
When an application is registered with Azure AD, the app developer registers federation-related information with Azure AD. This information includes the **Redirect URI** and **Metadata URI** of the application.
2525

26-
The Microsoft identity platform uses the cloud service's **Metadata URI** to retrieve the signing key and the logout URI. In the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>, you can open the app in **Azure Active Directory -> App registrations**, and then in **Manage -> Authentication**, you can update the Logout URL. This way the Microsoft identity platform can send the response to the correct URL.
26+
The Microsoft identity platform uses the cloud service's **Metadata URI** to retrieve the signing key and the logout URI. This way the Microsoft identity platform can send the response to the correct URL. In the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>;
2727

28-
Azure AD exposes tenant-specific and common (tenant-independent) SSO and single sign-out endpoints. These URLs represent addressable locations--they're not just identifiers--so you can go to the endpoint to read the metadata.
28+
- Open the app in **Azure Active Directory** and select **App registrations**
29+
- Under **Manage**, select **Authentication**. From there you can update the Logout URL.
2930

30-
- The tenant-specific endpoint is located at `https://login.microsoftonline.com/<TenantDomainName>/FederationMetadata/2007-06/FederationMetadata.xml`. The _\<TenantDomainName>_ placeholder represents a registered domain name or TenantID GUID of an Azure AD tenant. For example, the federation metadata of the contoso.com tenant is at: https://login.microsoftonline.com/contoso.com/FederationMetadata/2007-06/FederationMetadata.xml
31+
Azure AD exposes tenant-specific and common (tenant-independent) SSO and single sign-out endpoints. These URLs represent addressable locations, and aren't only identifiers. You can then go to the endpoint to read the metadata.
32+
33+
- The tenant-specific endpoint is located at `https://login.microsoftonline.com/<TenantDomainName>/FederationMetadata/2007-06/FederationMetadata.xml`. The *\<TenantDomainName>* placeholder represents a registered domain name or TenantID GUID of an Azure AD tenant. For example, the federation metadata of the `contoso.com` tenant is at: https://login.microsoftonline.com/contoso.com/FederationMetadata/2007-06/FederationMetadata.xml
3134

3235
- The tenant-independent endpoint is located at
33-
`https://login.microsoftonline.com/common/FederationMetadata/2007-06/FederationMetadata.xml`. In this endpoint address, **common** appears instead of a tenant domain name or ID.
36+
`https://login.microsoftonline.com/common/FederationMetadata/2007-06/FederationMetadata.xml`. In this endpoint address, *common* appears instead of a tenant domain name or ID.
3437

3538
## Next steps
3639

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
title: "How to configure app instance property lock in your applications"
3+
description: How to increase app security by configuring property modification locks for sensitive properties of the application.
4+
services: active-directory
5+
manager: saumadan
6+
ms.service: active-directory
7+
ms.subservice: develop
8+
ms.topic: conceptual
9+
ms.workload: identity
10+
ms.date: 11/03/2022
11+
author: madansr7
12+
ms.author: saumadan
13+
ms.reviewer:
14+
# Customer intent: As an application developer, I want to learn how to protect properties of my application instance of being modified.
15+
---
16+
# How to configure app instance property lock for your applications (Preview)
17+
18+
Application instance lock is a feature in Azure Active Directory (Azure AD) that allows sensitive properties of a multi-tenant application object to be locked for modification after the application is provisioned in another tenant.
19+
This feature provides application developers with the ability to lock certain properties if the application doesn't support scenarios that require configuring those properties.
20+
21+
22+
## What are sensitive properties?
23+
24+
The following property usage scenarios are considered as sensitive:
25+
26+
- Credentials (`keyCredentials`, `passwordCredentials`) where usage type is `Sign`. This is a scenario where your application supports a SAML flow.
27+
- Credentials (`keyCredentials`, `passwordCredentials`) where usage type is `Verify`. In this scenario, your application supports an OIDC client credentials flow.
28+
- `TokenEncryptionKeyId` which specifies the keyId of a public key from the keyCredentials collection. When configured, Azure AD encrypts all the tokens it emits by using the key to which this property points. The application code that receives the encrypted token must use the matching private key to decrypt the token before it can be used for the signed-in user.
29+
30+
## Configure an app instance lock
31+
32+
To configure an app instance lock using the Azure portal:
33+
34+
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
35+
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant that contains the app registration you want to configure.
36+
1. Search for and select **Azure Active Directory**.
37+
1. Under **Manage**, select **App registrations**, and then select the application you want to configure.
38+
1. Select **Authentication**, and then select **Configure** under the *App instance property lock* section.
39+
40+
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-overview.png" alt-text="Screenshot of an app registration's app instance lock in the Azure portal.":::
41+
42+
2. In the **App instance property lock** pane, enter the settings for the lock. The table following the image describes each setting and their parameters.
43+
44+
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-properties.png" alt-text="Screenshot of an app registration's app instance property lock context pane in the Azure portal.":::
45+
46+
| Field | Description |
47+
| ---------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
48+
| **Enable property lock** | Specifies if the property locks are enabled. |
49+
| **All properties** | Locks all sensitive properties without needing to select each property scenario. |
50+
| **Credentials used for verification** | Locks the ability to add or update credential properties (`keyCredentials`, `passwordCredentials`) where usage type is `verify`. |
51+
| **Credentials used for signing tokens** | Locks the ability to add or update credential properties (`keyCredentials`, `passwordCredentials`) where usage type is `sign`. |
52+
| **Token Encryption KeyId** | Locks the ability to change the `tokenEncryptionKeyId` property. |
53+
54+
3. Select **Save** to save your changes.

0 commit comments

Comments
 (0)