Skip to content

Commit 3b94290

Browse files
Merge pull request #251705 from rwike77/entraadmin
Microsoft Entra admin center updates
2 parents aee9b6b + 1e130b9 commit 3b94290

5 files changed

+21
-21
lines changed

articles/active-directory/develop/howto-modify-supported-accounts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 02/17/2023
12+
ms.date: 09/15/2023
1313
ms.author: ryanwi
1414
ms.custom: aaddev
1515
ms.reviewer: aragra, sureshja

articles/active-directory/workload-identities/workload-identity-federation-considerations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ For more information on the scenarios enabled by federated identity credentials,
2626

2727
*Applies to: applications and user-assigned managed identities*
2828

29-
Anyone with permissions to create an app registration and add a secret or certificate can add a federated identity credential to an app. If the **Users can register applications** switch in the [User Settings](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/UserSettings) blade is set to **No**, however, you won't be able to create an app registration or configure the federated identity credential. Find an admin to configure the federated identity credential on your behalf, someone in the Application Administrator or Application Owner roles.
29+
Anyone with permissions to create an app registration and add a secret or certificate can add a federated identity credential to an app. If the **Users can register applications** switch is set to **No** in the **Users->User Settings** blade in the [Microsoft Entra admin center](https://entra.microsoft.com), however, you won't be able to create an app registration or configure the federated identity credential. Find an admin to configure the federated identity credential on your behalf, someone in the Application Administrator or Application Owner roles.
3030

3131
Federated identity credentials don't consume the Azure AD tenant service principal object quota.
3232

articles/active-directory/workload-identities/workload-identity-federation-create-trust-user-assigned-managed-identity.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: workload-identities
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 03/27/2023
12+
ms.date: 09/15/2023
1313
ms.author: ryanwi
1414
ms.custom: aaddev, devx-track-azurecli, devx-track-azurepowershell
1515
ms.reviewer: shkhalide, udayh, vakarand
@@ -44,7 +44,7 @@ To learn more about supported regions, time to propagate federated credential up
4444

4545
## Configure a federated identity credential on a user-assigned managed identity
4646

47-
In the [Azure portal](https://portal.azure.com), navigate to the user-assigned managed identity you created. Under **Settings** in the left nav bar, select **Federated credentials** and then **Add Credential**.
47+
In the [Microsoft Entra admin center](https://entra.microsoft.com), navigate to the user-assigned managed identity you created. Under **Settings** in the left nav bar, select **Federated credentials** and then **Add Credential**.
4848

4949
In the **Federated credential scenario** dropdown box, select your scenario.
5050

@@ -158,13 +158,13 @@ Select **Add** to configure the federated credential.
158158

159159
## List federated identity credentials on a user-assigned managed identity
160160

161-
In the [Azure portal](https://portal.azure.com), navigate to the user-assigned managed identity you created. Under **Settings** in the left nav bar and select **Federated credentials**.
161+
In the [Microsoft Entra admin center](https://entra.microsoft.com), navigate to the user-assigned managed identity you created. Under **Settings** in the left nav bar and select **Federated credentials**.
162162

163163
The federated identity credentials configured on that user-assigned managed identity are listed.
164164

165165
## Delete a federated identity credential from a user-assigned managed identity
166166

167-
In the [Azure portal](https://portal.azure.com), navigate to the user-assigned managed identity you created. Under **Settings** in the left nav bar and select **Federated credentials**.
167+
In the [Microsoft Entra admin center](https://entra.microsoft.com), navigate to the user-assigned managed identity you created. Under **Settings** in the left nav bar and select **Federated credentials**.
168168

169169
The federated identity credentials configured on that user-assigned managed identity are listed.
170170

articles/active-directory/workload-identities/workload-identity-federation-create-trust.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: workload-identities
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 01/19/2023
12+
ms.date: 09/15/2023
1313
ms.author: ryanwi
1414
ms.custom: aaddev, devx-track-azurecli, devx-track-azurepowershell
1515
ms.reviewer: shkhalid, udayh, vakarand
@@ -38,7 +38,7 @@ To learn more about supported regions, time to propagate federated credential up
3838
## Prerequisites
3939
[Create an app registration](/azure/active-directory/develop/quickstart-register-app) in Azure AD. Grant your app access to the Azure resources targeted by your external software workload.
4040

41-
Find the object ID of the app (not the application (client) ID), which you need in the following steps. You can find the object ID of the app in the Azure portal. Go to the list of [registered applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps) in the Azure portal and select your app registration. In **Overview**->**Essentials**, find the **Object ID**.
41+
Find the object ID of the app (not the application (client) ID), which you need in the following steps. You can find the object ID of the app in the [Microsoft Entra admin center](https://entra.microsoft.com). Go to the list of app registrations and select your app registration. In **Overview**->**Essentials**, find the **Object ID**.
4242

4343
Get the *subject* and *issuer* information for your external IdP and software workload, which you need in the following steps.
4444

@@ -48,7 +48,7 @@ Get the *subject* and *issuer* information for your external IdP and software wo
4848

4949
To add a federated identity for GitHub actions, follow these steps:
5050

51-
1. Find your app registration in the [App Registrations](https://aka.ms/appregistrations) experience of the Azure portal. Select **Certificates & secrets** in the left nav pane, select the **Federated credentials** tab, and select **Add credential**.
51+
1. Find your app registration in the app registrations experience of the [Microsoft Entra admin center](https://entra.microsoft.com). Select **Certificates & secrets** in the left nav pane, select the **Federated credentials** tab, and select **Add credential**.
5252

5353
1. In the **Federated credential scenario** drop-down box, select **GitHub actions deploying Azure resources**.
5454

@@ -74,7 +74,7 @@ Use the following values from your Azure AD application registration for your Gi
7474

7575
![Screenshot that demonstrates how to copy the application ID and tenant ID from Microsoft Entra admin center.](./media/workload-identity-federation-create-trust/copy-client-id.png)
7676

77-
- `AZURE_SUBSCRIPTION_ID` your subscription ID. To get the subscription ID, open **Subscriptions** in Azure portal and find your subscription. Then, copy the **Subscription ID**.
77+
- `AZURE_SUBSCRIPTION_ID` your subscription ID. To get the subscription ID, open **Subscriptions** in [Azure portal](https://portal.azure.com) and find your subscription. Then, copy the **Subscription ID**.
7878

7979
#### Entity type examples
8080

@@ -139,7 +139,7 @@ For a workflow triggered by a pull request event, specify an **Entity type** of
139139
140140
### Kubernetes
141141
142-
Find your app registration in the [App Registrations](https://aka.ms/appregistrations) experience of the Azure portal. Select **Certificates & secrets** in the left nav pane, select the **Federated credentials** tab, and select **Add credential**.
142+
Find your app registration in the app registrations experience of the [Microsoft Entra admin center](https://entra.microsoft.com). Select **Certificates & secrets** in the left nav pane, select the **Federated credentials** tab, and select **Add credential**.
143143
144144
Select the **Kubernetes accessing Azure resources** scenario from the dropdown menu.
145145
@@ -152,7 +152,7 @@ Fill in the **Cluster issuer URL**, **Namespace**, **Service account name**, and
152152
153153
### Other identity providers
154154
155-
Find your app registration in the [App Registrations](https://aka.ms/appregistrations) experience of the Azure portal. Select **Certificates & secrets** in the left nav pane, select the **Federated credentials** tab, and select **Add credential**.
155+
Find your app registration in the app registrations experience of the [Microsoft Entra admin center](https://entra.microsoft.com). Select **Certificates & secrets** in the left nav pane, select the **Federated credentials** tab, and select **Add credential**.
156156
157157
Select the **Other issuer** scenario from the dropdown menu.
158158
@@ -164,11 +164,11 @@ Specify the following fields (using a software workload running in Google Cloud
164164

165165
## List federated identity credentials on an app
166166

167-
Find your app registration in the [App Registrations](https://aka.ms/appregistrations) experience of the Azure portal. Select **Certificates & secrets** in the left nav pane and select the **Federated credentials** tab. The federated credentials that are configured on your app are listed.
167+
Find your app registration in the app registrations experience of the [Microsoft Entra admin center](https://entra.microsoft.com). Select **Certificates & secrets** in the left nav pane and select the **Federated credentials** tab. The federated credentials that are configured on your app are listed.
168168

169169
## Delete a federated identity credential from an app
170170

171-
Find your app registration in the [App Registrations](https://aka.ms/appregistrations) experience of the Azure portal. Select **Certificates & secrets** in the left nav pane and select the **Federated credentials** tab. The federated credentials that are configured on your app are listed.
171+
Find your app registration in the app registrations experience of the [Microsoft Entra admin center](https://entra.microsoft.com). Select **Certificates & secrets** in the left nav pane and select the **Federated credentials** tab. The federated credentials that are configured on your app are listed.
172172

173173
To delete a federated identity credential, select the **Delete** icon for the credential.
174174

@@ -183,7 +183,7 @@ To delete a federated identity credential, select the **Delete** icon for the cr
183183
[!INCLUDE [azure-cli-prepare-your-environment-no-header.md](~/articles/reusable-content/azure-cli/azure-cli-prepare-your-environment-no-header.md)]
184184

185185
- [Create an app registration](/azure/active-directory/develop/quickstart-register-app) in Azure AD. Grant your app access to the Azure resources targeted by your external software workload.
186-
- Find the object ID, app (client) ID, or identifier URI of the app, which you need in the following steps. You can find these values in the Azure portal. Go to the list of [registered applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps) in the Azure portal and select your app registration. In **Overview**->**Essentials**, get the **Object ID**, **Application (client) ID**, or **Application ID URI** value, which you need in the following steps.
186+
- Find the object ID, app (client) ID, or identifier URI of the app, which you need in the following steps. You can find these values in the [Microsoft Entra admin center](https://entra.microsoft.com). Go to the list of registered applications and select your app registration. In **Overview**->**Essentials**, get the **Object ID**, **Application (client) ID**, or **Application ID URI** value, which you need in the following steps.
187187
- Get the *subject* and *issuer* information for your external IdP and software workload, which you need in the following steps.
188188

189189
## Configure a federated identity credential on an app
@@ -313,7 +313,7 @@ az ad app federated-credential delete --id f6475511-fd81-4965-a00e-41e7792b7b9c
313313
- Use [Azure Cloud Shell](../../cloud-shell/overview.md), which you can open by using the **Try It** button in the upper-right corner of code blocks.
314314
- Run scripts locally with Azure PowerShell, as described in the next section.
315315
- [Create an app registration](/azure/active-directory/develop/quickstart-register-app) in Azure AD. Grant your app access to the Azure resources targeted by your external software workload.
316-
- Find the object ID of the app (not the application (client) ID), which you need in the following steps. You can find the object ID of the app in the Azure portal. Go to the list of [registered applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps) in the Azure portal and select your app registration. In **Overview**->**Essentials**, find the **Object ID**.
316+
- Find the object ID of the app (not the application (client) ID), which you need in the following steps. You can find the object ID of the app in the [Microsoft Entra admin center](https://entra.microsoft.com). Go to the list of registered applications and select your app registration. In **Overview**->**Essentials**, find the **Object ID**.
317317
- Get the *subject* and *issuer* information for your external IdP and software workload, which you need in the following steps.
318318

319319
### Configure Azure PowerShell locally
@@ -418,7 +418,7 @@ Remove-AzADAppFederatedCredential -ApplicationObjectId $appObjectId -FederatedCr
418418
## Prerequisites
419419
[Create an app registration](/azure/active-directory/develop/quickstart-register-app) in Azure AD. Grant your app access to the Azure resources targeted by your external software workload.
420420

421-
Find the object ID of the app (not the application (client) ID), which you need in the following steps. You can find the object ID of the app in the Azure portal. Go to the list of [registered applications](https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/RegisteredApps) in the Azure portal and select your app registration. In **Overview**->**Essentials**, find the **Object ID**.
421+
Find the object ID of the app (not the application (client) ID), which you need in the following steps. You can find the object ID of the app in the [Microsoft Entra admin center](https://entra.microsoft.com). Go to the list of registered applications and select your app registration. In **Overview**->**Essentials**, find the **Object ID**.
422422

423423
Get the *subject* and *issuer* information for your external IdP and software workload, which you need in the following steps.
424424

articles/active-directory/workload-identities/workload-identity-federation.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: workload-identities
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 03/29/2023
12+
ms.date: 09/15/2023
1313
ms.author: ryanwi
1414
ms.reviewer: shkhalid, udayh
1515
ms.custom: aaddev
@@ -35,7 +35,7 @@ You use workload identity federation to configure an [user-assigned managed iden
3535
The following scenarios are supported for accessing Azure AD protected resources using workload identity federation:
3636

3737
- Workloads running on any Kubernetes cluster (Azure Kubernetes Service (AKS), Amazon Web Services EKS, Google Kubernetes Engine (GKE), or on-premises). Establish a trust relationship between your user-assigned managed identity or app in Azure AD and a Kubernetes workload (described in the [workload identity overview](../../aks/workload-identity-overview.md)).
38-
- GitHub Actions. First, configure a trust relationship between your [user-assigned managed identity](workload-identity-federation-create-trust-user-assigned-managed-identity.md) or [application](workload-identity-federation-create-trust.md) in Azure AD and a GitHub repo in the Azure portal or using Microsoft Graph. Then [configure a GitHub Actions workflow](/azure/developer/github/connect-from-azure) to get an access token from Microsoft identity provider and access Azure resources.
38+
- GitHub Actions. First, configure a trust relationship between your [user-assigned managed identity](workload-identity-federation-create-trust-user-assigned-managed-identity.md) or [application](workload-identity-federation-create-trust.md) in Azure AD and a GitHub repo in the [Microsoft Entra admin center](https://entra.microsoft.com) or using Microsoft Graph. Then [configure a GitHub Actions workflow](/azure/developer/github/connect-from-azure) to get an access token from Microsoft identity provider and access Azure resources.
3939
- Google Cloud. First, configure a trust relationship between your user-assigned managed identity or app in Azure AD and an identity in Google Cloud. Then configure your software workload running in Google Cloud to get an access token from Microsoft identity provider and access Azure AD protected resources. See [Access Azure AD protected resources from an app in Google Cloud](https://blog.identitydigest.com/azuread-federate-gcp/).
4040
- Workloads running in Amazon Web Services (AWS). First, configure a trust relationship between your user-assigned managed identity or app in Azure AD and an identity in Amazon Cognito. Then configure your software workload running in AWS to get an access token from Microsoft identity provider and access Azure AD protected resources. See [Workload identity federation with AWS](https://blog.identitydigest.com/azuread-federate-aws/).
4141
- Other workloads running in compute platforms outside of Azure. Configure a trust relationship between your [user-assigned managed identity](workload-identity-federation-create-trust-user-assigned-managed-identity.md) or [application](workload-identity-federation-create-trust.md) in Azure AD and the external IdP for your compute platform. You can use tokens issued by that platform to authenticate with Microsoft identity platform and call APIs in the Microsoft ecosystem. Use the [client credentials flow](/azure/active-directory/develop/v2-oauth2-client-creds-grant-flow#third-case-access-token-request-with-a-federated-credential) to get an access token from Microsoft identity platform, passing in the identity provider's JWT instead of creating one yourself using a stored certificate.
@@ -48,8 +48,8 @@ The following scenarios are supported for accessing Azure AD protected resources
4848

4949
Create a trust relationship between the external IdP and a [user-assigned managed identity](workload-identity-federation-create-trust-user-assigned-managed-identity.md) or [application](workload-identity-federation-create-trust.md) in Azure AD. The federated identity credential is used to indicate which token from the external IdP should be trusted by your application or managed identity. You configure a federated identity either:
5050

51-
- On a user-assigned managed identity through the Azure portal, Azure CLI, Azure PowerShell, Azure SDK, and Azure Resource Manager (ARM) templates. The external workload uses the access token to access Azure AD protected resources without needing to manage secrets (in supported scenarios). The [steps for configuring the trust relationship](workload-identity-federation-create-trust-user-assigned-managed-identity.md) will differ, depending on the scenario and external IdP.
52-
- On an Azure AD [App registration](/azure/active-directory/develop/quickstart-register-app) in the Azure portal or through Microsoft Graph. This configuration allows you to get an access token for your application without needing to manage secrets outside Azure. For more information, learn how to [configure an app to trust an external identity provider](workload-identity-federation-create-trust.md).
51+
- On a user-assigned managed identity through the [Microsoft Entra admin center](https://entra.microsoft.com), Azure CLI, Azure PowerShell, Azure SDK, and Azure Resource Manager (ARM) templates. The external workload uses the access token to access Azure AD protected resources without needing to manage secrets (in supported scenarios). The [steps for configuring the trust relationship](workload-identity-federation-create-trust-user-assigned-managed-identity.md) will differ, depending on the scenario and external IdP.
52+
- On an app registration in the [Microsoft Entra admin center](https://entra.microsoft.com) or through Microsoft Graph. This configuration allows you to get an access token for your application without needing to manage secrets outside Azure. For more information, learn how to [configure an app to trust an external identity provider](workload-identity-federation-create-trust.md).
5353

5454
The workflow for exchanging an external token for an access token is the same, however, for all scenarios. The following diagram shows the general workflow of a workload exchanging an external token for an access token and then accessing Azure AD protected resources.
5555

0 commit comments

Comments
 (0)