Skip to content

Commit 4210cef

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into training-page
2 parents 451b529 + 06464dd commit 4210cef

File tree

213 files changed

+4395
-2773
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

213 files changed

+4395
-2773
lines changed

.openpublishing.redirection.defender-for-iot.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-training-sessions.md",
5+
"redirect_url": "https://techcommunity.microsoft.com/t5/microsoft-defender-for-iot-blog/microsoft-defender-for-iot-ninja-training/ba-p/2428899",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-manage-the-alert-event.md",
10+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-view-alerts",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/defender-for-iot/organizations/resources-training-sessions.md",
515
"redirect_url": "https://techcommunity.microsoft.com/t5/microsoft-defender-for-iot-blog/microsoft-defender-for-iot-ninja-training/ba-p/2428899",

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5988,6 +5988,11 @@
59885988
"redirect_url": "/azure/automation/create-azure-automation-account-portal",
59895989
"redirect_document_id": false
59905990
},
5991+
{
5992+
"source_path_from_root": "/articles/automation/automation-solution-vm-management-enable.md",
5993+
"redirect_url": "/azure/automation/automation-solution-vm-management",
5994+
"redirect_document_id": false
5995+
},
59915996
{
59925997
"source_path_from_root": "/articles/update-center/enable-machines.md",
59935998
"redirect_url": "/azure/update-center/updates-maintenance-schedules",

articles/active-directory-b2c/partner-strata.md

Lines changed: 113 additions & 135 deletions
Large diffs are not rendered by default.

articles/active-directory-b2c/partner-whoiam.md

Lines changed: 44 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -4,100 +4,84 @@ titleSuffix: Azure AD B2C
44
description: In this tutorial, learn how to integrate Azure AD B2C authentication with WhoIAM for user verification.
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: CelesteDG
7+
manager: martinco
88
ms.reviewer: kengaderdus
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 09/13/2022
12+
ms.date: 12/19/2022
1313
ms.author: gasinh
1414
ms.subservice: B2C
1515
---
1616

17-
# Tutorial for configuring WhoIAM with Azure Active Directory B2C
17+
# Tutorial to configure Azure Active Directory B2C with WhoIAM
1818

19-
In this sample tutorial, we provide guidance on how to configure [WhoIAM](https://www.whoiam.ai/brims/) Branded Identity Management System (BRIMS) in your environment and integrate it with Active Directory B2C (Azure AD B2C).
19+
In this tutorial, learn how to configure WhoIAM Branded Identity Management System (BRIMS) in your environment and integrate it with Azure Active Directory B2C (Azure AD B2C). The BRIMS apps and services are deployed in your environment. They provide user verification with voice, SMS, and email. BRIMS works with your identity and access management solution and is platform-agnostic.
20+
21+
Learn more: [WhoIAM, Products and Services, Branded Identity Management System](https://www.whoiam.ai/brims/)
2022

21-
BRIMS is a set of apps and services that's deployed in your environment. It provides voice, SMS, and email verification of your user base. BRIMS works in conjunction with your existing identity and access management solution and is platform agnostic.
2223

2324
## Prerequisites
2425

2526
To get started, you'll need:
2627

27-
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
28-
29-
- [An Azure AD B2C tenant](./tutorial-create-tenant.md) that's linked to your Azure subscription.
30-
31-
- A WhoIAM [trial account](https://www.whoiam.ai/contact-us/).
28+
- An Azure AD subscription
29+
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/free/)
30+
- [An Azure AD B2C tenant](./tutorial-create-tenant.md) linked to your Azure subscription
31+
- A WhoIAM trial account
32+
- Go to [WhoIAM, Contact us](https://www.whoiam.ai/contact-us/) to get started
3233

3334
## Scenario description
3435

3536
The WhoIAM integration includes the following components:
3637

37-
- An Azure AD B2C tenant. It's the authorization server that verifies the user's credentials based on custom policies defined in it. It's also known as the identity provider.
38-
39-
- An administration portal for managing clients and their configurations.
40-
41-
- An API service that exposes various features through endpoints.
42-
43-
- Azure Cosmos DB, which acts as the back end for both the BRIMS administration portal and the API service.
38+
- **Azure AD B2C tenant** - The authorization server that verifies user credentials, based on custom policies, know as the identity provider (IdP)
39+
- **Administration portal** - To manage clients and their configurations
40+
- **API service** - To expose various features through endpoints
41+
- **Azure Cosmos DB** - The back end for the BRIMS administration portal and API service
4442

45-
The following architecture diagram shows the implementation.
43+
The following diagram shows the implementation architecture.
4644

47-
![Diagram of the architecture of Azure AD B2C integration with WhoIAM.](media/partner-whoiam/whoiam-architecture-diagram.png)
45+
![Diagram of Azure AD B2C integration with WhoIAM.](media/partner-whoiam/whoiam-architecture-diagram.png)
4846

49-
|Step | Description |
50-
|:-----| :-----------|
51-
| 1. | The user arrives at a page to start the sign-up or sign-in request to an app that uses Azure AD B2C as its identity provider.
52-
| 2. | As part of authentication, the user requests to either verify ownership of their email or phone or use their voice as a biometric verification factor.
53-
| 3. | Azure AD B2C makes a call to the BRIMS API service and passes on the user's email address, phone number, and voice recording.
54-
| 4. | BRIMS uses predefined configurations such as fully customizable email and SMS templates to interact with the user in their respective language in a way that's consistent with the app's style.
55-
| 5. | After a user's identity verification is complete, BRIMS returns a token to Azure AD B2C to indicate the outcome of the verification. Azure AD B2C then either grants the user access to the app or fails their authentication attempt.
47+
1. The user signs up or signs in to request an app that uses Azure AD B2C as IdP
48+
2. The user requests ownership verification of their email, phone, or they use voice as biometric verification
49+
3. Azure AD B2C calls to the BRIMS API service and passes the user attributes
50+
4. BRIMS interacts with the user in their own language
51+
5. After verification, BRIMS returns a token to Azure AD B2C, which grants access, or doesn't.
5652

5753
## Sign up with WhoIAM
5854

5955
1. Contact [WhoIAM](https://www.whoiam.ai/contact-us/) and create a BRIMS account.
56+
2. Configure the following Azure services:
6057

61-
2. Use the sign-up guidelines made available to you and configure the following Azure services:
62-
63-
- [Azure Key Vault](https://azure.microsoft.com/services/key-vault/): Used for secure storage of passwords, such as mail service passwords.
64-
65-
- [Azure App Service](https://azure.microsoft.com/services/app-service/): Used to host the BRIMS API and admin portal services.
66-
67-
- [Azure Active Directory](https://azure.microsoft.com/services/active-directory/): Used to authenticate administrative users for the admin portal.
68-
69-
- [Azure Cosmos DB](https://azure.microsoft.com/services/cosmos-db/): Used to store and retrieve settings.
70-
71-
- [Application Insights](../azure-monitor/app/app-insights-overview.md) (optional): Used to log in to both the API and the admin portal.
58+
* [Key Vault](https://azure.microsoft.com/services/key-vault/): Store passwords
59+
* [App Service](https://azure.microsoft.com/services/app-service/): Host the BRIMS API and admin portal services
60+
* [Azure Active Directory](https://azure.microsoft.com/services/active-directory/): Authenticate administrative users for the portal
61+
* [Azure Cosmos DB](https://azure.microsoft.com/services/cosmos-db/): Store and retrieve settings
62+
* [Application Insights overview](../azure-monitor/app/app-insights-overview.md) (optional): Sign in to the API and the portal
7263

7364
3. Deploy the BRIMS API and the BRIMS administration portal in your Azure environment.
74-
75-
4. Azure AD B2C custom policy samples are available in your BRIMS sign-up documentation. Follow the documentation to configure your app and use the BRIMS platform for user identity verification.
76-
77-
For more information about WhoIAM's BRIMS, see the [product documentation](https://www.whoiam.ai/brims/).
65+
4. Follow the documentation to configure your app. Use BRIMS for user identity verification. Azure AD B2C custom policy samples are in the BRIMS sign-up documentation.
66+
For more information about WhoIAM BRIMS, request documentation on [WhoIAM, Contact Us](https://www.whoiam.ai/brims/).
7867

7968
## Test the user flow
8069

81-
1. Open the Azure AD B2C tenant. Under **Policies**, select **Identity Experience Framework**.
82-
83-
2. Select your previously created **SignUpSignIn**.
84-
85-
3. Select **Run user flow** and then:
86-
87-
a. For **Application**, select the registered app (the sample is JWT).
70+
1. Open the Azure AD B2C tenant.
71+
2. Under **Policies**, select **Identity Experience Framework**.
72+
3. Select the created **SignUpSignIn**.
73+
4. Select **Run user flow**.
74+
5. For **Application**, select the registered app (example is JWT).
75+
6. For **Reply URL**, select the **redirect URL**.
76+
7. Select **Run user flow**.
77+
8. Complete the sign-up flow
78+
9. Create an account.
79+
10. After the user attribute is created, the BRIMS service is called.
8880

89-
b. For **Reply URL**, select the **redirect URL**.
90-
91-
c. Select **Run user flow**.
92-
93-
4. Go through the sign-up flow and create an account.
94-
95-
5. The BRIMS service will be called during the flow, after the user attribute is created. If the flow is incomplete, check that the user isn't saved in the directory.
81+
> [!TIP]
82+
> If the flow is incomplete, confirm the user is saved in the directory.
9683
9784
## Next steps
9885

99-
For additional information, review the following articles:
100-
101-
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
102-
103-
- [Get started with custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
86+
- [Azure AD B2C custom policy overview](./custom-policy-overview.md)
87+
- [Tutorial: Create user flows and custom policies in Azure Active Directory B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)

articles/active-directory-domain-services/faqs.yml

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ metadata:
1111
ms.subservice: domain-services
1212
ms.workload: identity
1313
ms.topic: faq
14-
ms.date: 08/17/2022
14+
ms.date: 01/04/2023
1515
ms.author: justinha
1616
title: Frequently asked questions (FAQs) about Azure Active Directory (AD) Domain Services
1717
summary: This page answers frequently asked questions about Azure Active Directory Domain Services.
@@ -84,15 +84,10 @@ sections:
8484
answer: |
8585
No. A managed domain resource forest supports up to five one-way outbound forest trusts to on-premises forests.
8686
87-
- question: |
88-
Why can't I see the Trusts menu?
89-
answer: |
90-
If you don't see the **Trusts** menu option, check under **Properties** for the **Forest type**. Only **Resource** forests can create trusts. If the forest type is **User**, you can't create trusts. There's currently no way to change the forest type of a managed domain. You need to delete and recreate the managed domain as a resource forest.
91-
9287
- question: |
9388
Can I move a managed domain?
9489
answer: |
95-
No. After you create an Azure AD Domain Services managed domain, you can't move it to a different subscription, resource group, region, virtual network, or subnet. As a workaround, you can [delete the managed domain](delete-aadds.md) by using PowerShell or the Azure portal and re-create it with your desired setup. No restore operations can be provided while the managed domain is re-created.
90+
After you create an Azure AD Domain Services managed domain, you can't move it to a different subscription, resource group, or region. As a workaround, you can [delete the managed domain](delete-aadds.md) by using PowerShell or the Azure portal and re-create it with your desired setup. No restore operations can be provided while the managed domain is re-created.
9691
9792
- question: |
9893
Can I rename an existing Azure AD Domain Services domain name?
-50.6 KB
Loading

articles/active-directory-domain-services/secure-your-domain.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 08/17/2022
13+
ms.date: 01/04/2023
1414
ms.author: justinha
1515
ms.custom: devx-track-azurepowershell
1616

@@ -25,6 +25,8 @@ This article shows you how to harden a managed domain by using setting setting s
2525
- Disable NTLM password hash synchronization
2626
- Disable the ability to change passwords with RC4 encryption
2727
- Enable Kerberos armoring
28+
- LDAP signing
29+
- LDAP channel binding
2830

2931
## Prerequisites
3032

@@ -44,12 +46,13 @@ To complete this article, you need the following resources:
4446
1. Choose your managed domain, such as *aaddscontoso.com*.
4547
1. On the left-hand side, select **Security settings**.
4648
1. Click **Enable** or **Disable** for the following settings:
47-
- **TLS 1.2 only mode**
48-
- **NTLM authentication**
49-
- **Password synchronization from on-premises**
50-
- **NTLM password synchronization from on-premises**
51-
- **RC4 encryption**
52-
- **Kerberos armoring**
49+
- **TLS 1.2 Only Mode**
50+
- **NTLM v1 Authentication**
51+
- **NTLM Password Synchronization**
52+
- **Kerberos RC4 Encryption**
53+
- **Kerberos Armoring**
54+
- **LDAP Signing**
55+
- **LDAP Channel Binding**
5356

5457
![Screenshot of Security settings to disable weak ciphers and NTLM password hash sync](media/secure-your-domain/security-settings.png)
5558

articles/active-directory-domain-services/tutorial-create-instance-advanced.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 06/16/2022
11+
ms.date: 01/04/2023
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain and define advanced configuration options so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -44,7 +44,7 @@ To complete this tutorial, you need the following resources and privileges:
4444
Although not required for Azure AD DS, it's recommended to [configure self-service password reset (SSPR)][configure-sspr] for the Azure AD tenant. Users can change their password without SSPR, but SSPR helps if they forget their password and need to reset it.
4545

4646
> [!IMPORTANT]
47-
> After you create a managed domain, you can't then move the managed domain to a different resource group, virtual network, subscription, etc. Take care to select the most appropriate subscription, resource group, region, and virtual network when you deploy the managed domain.
47+
> After you create a managed domain, you can't move it to a different subscription, resource group, or region. Take care to select the most appropriate subscription, resource group, and region when you deploy the managed domain.
4848
4949
## Sign in to the Azure portal
5050

@@ -119,7 +119,6 @@ Some considerations for this dedicated virtual network subnet include the follow
119119
* The subnet must have at least 3-5 available IP addresses in its address range to support the Azure AD DS resources.
120120
* Don't select the *Gateway* subnet for deploying Azure AD DS. It's not supported to deploy Azure AD DS into a *Gateway* subnet.
121121
* Don't deploy any other virtual machines to the subnet. Applications and VMs often use network security groups to secure connectivity. Running these workloads in a separate subnet lets you apply those network security groups without disrupting connectivity to your managed domain.
122-
* You can't move your managed domain to a different virtual network after you enable Azure AD DS.
123122

124123
For more information on how to plan and configure the virtual network, see [networking considerations for Azure Active Directory Domain Services][network-considerations].
125124

articles/active-directory-domain-services/tutorial-create-instance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: domain-services
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 06/16/2022
11+
ms.date: 01/04/2023
1212
ms.author: justinha
1313

1414
#Customer intent: As an identity administrator, I want to create an Azure Active Directory Domain Services managed domain so that I can synchronize identity information with my Azure Active Directory tenant and provide Domain Services connectivity to virtual machines and applications in Azure.
@@ -44,7 +44,7 @@ To complete this tutorial, you need the following resources and privileges:
4444
Although not required for Azure AD DS, it's recommended to [configure self-service password reset (SSPR)][configure-sspr] for the Azure AD tenant. Users can change their password without SSPR, but SSPR helps if they forget their password and need to reset it.
4545

4646
> [!IMPORTANT]
47-
> You can't move the managed domain to a different subscription, resource group, region, virtual network, or subnet after you create it. Take care to select the most appropriate subscription, resource group, region, virtual network, and subnet when you deploy the managed domain.
47+
> You can't move the managed domain to a different subscription, resource group, or region after you create it. Take care to select the most appropriate subscription, resource group, and region when you deploy the managed domain.
4848
4949
## Sign in to the Azure portal
5050

0 commit comments

Comments
 (0)