Skip to content

Commit 42dedf1

Browse files
authored
Merge branch 'main' into tamram22-1107
2 parents f39d4f8 + cbb8e09 commit 42dedf1

File tree

56 files changed

+591
-271
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

56 files changed

+591
-271
lines changed

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -183,6 +183,8 @@
183183
href: app-resilience-continuous-access-evaluation.md
184184
- name: Claims challenges and requests
185185
href: claims-challenge.md
186+
- name: Configure app instance property lock
187+
href: howto-configure-app-instance-property-locks.md
186188
- name: Test
187189
items:
188190
- name: Build a test environment
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
title: "How to configure app instance property lock in your applications"
3+
description: How to increase app security by configuring property modification locks for sensitive properties of the application.
4+
services: active-directory
5+
manager: saumadan
6+
ms.service: active-directory
7+
ms.subservice: develop
8+
ms.topic: conceptual
9+
ms.workload: identity
10+
ms.date: 11/03/2022
11+
author: madansr7
12+
ms.author: saumadan
13+
ms.reviewer:
14+
# Customer intent: As an application developer, I want to learn how to protect properties of my application instance of being modified.
15+
---
16+
# How to configure app instance property lock for your applications (Preview)
17+
18+
Application instance lock is a feature in Azure Active Directory (Azure AD) that allows sensitive properties of a multi-tenant application object to be locked for modification after the application is provisioned in another tenant.
19+
This feature provides application developers with the ability to lock certain properties if the application doesn't support scenarios that require configuring those properties.
20+
21+
22+
## What are sensitive properties?
23+
24+
The following property usage scenarios are considered as sensitive:
25+
26+
- Credentials (`keyCredentials`, `passwordCredentials`) where usage type is `Sign`. This is a scenario where your application supports a SAML flow.
27+
- Credentials (`keyCredentials`, `passwordCredentials`) where usage type is `Verify`. In this scenario, your application supports an OIDC client credentials flow.
28+
- `TokenEncryptionKeyId` which specifies the keyId of a public key from the keyCredentials collection. When configured, Azure AD encrypts all the tokens it emits by using the key to which this property points. The application code that receives the encrypted token must use the matching private key to decrypt the token before it can be used for the signed-in user.
29+
30+
## Configure an app instance lock
31+
32+
To configure an app instance lock using the Azure portal:
33+
34+
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
35+
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to switch to the tenant that contains the app registration you want to configure.
36+
1. Search for and select **Azure Active Directory**.
37+
1. Under **Manage**, select **App registrations**, and then select the application you want to configure.
38+
1. Select **Authentication**, and then select **Configure** under the *App instance property lock* section.
39+
40+
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-overview.png" alt-text="Screenshot of an app registration's app instance lock in the Azure portal.":::
41+
42+
2. In the **App instance property lock** pane, enter the settings for the lock. The table following the image describes each setting and their parameters.
43+
44+
:::image type="content" source="media/howto-configure-app-instance-property-locks/app-instance-lock-configure-properties.png" alt-text="Screenshot of an app registration's app instance property lock context pane in the Azure portal.":::
45+
46+
| Field | Description |
47+
| ---------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
48+
| **Enable property lock** | Specifies if the property locks are enabled. |
49+
| **All properties** | Locks all sensitive properties without needing to select each property scenario. |
50+
| **Credentials used for verification** | Locks the ability to add or update credential properties (`keyCredentials`, `passwordCredentials`) where usage type is `verify`. |
51+
| **Credentials used for signing tokens** | Locks the ability to add or update credential properties (`keyCredentials`, `passwordCredentials`) where usage type is `sign`. |
52+
| **Token Encryption KeyId** | Locks the ability to change the `tokenEncryptionKeyId` property. |
53+
54+
3. Select **Save** to save your changes.
Loading
Loading

articles/active-directory/governance/tutorial-onboard-custom-workflow-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Use the following steps to create a pre-hire workflow that will generate a TAP a
6767

6868
:::image type="content" source="media/tutorial-lifecycle-workflows/configure-scope.png" alt-text="Screenshot of selecting a configuration scope." lightbox="media/tutorial-lifecycle-workflows/configure-scope.png":::
6969

70-
8. Next, you will configure the scope. The scope determines which users this workflow will run against. In this case, it will be on all users in the Sales department. On the configure scope screen, under **Rule** add the following settings and then select **Next: Review tasks**
70+
8. Next, you will configure the scope. The scope determines which users this workflow will run against. In this case, it will be on all users in the Sales department. On the configure scope screen, under **Rule** add the following settings and then select **Next: Review tasks**. For a full list of supported user properties, see: [Supported user properties and query parameters](/graph/api/resources/identitygovernance-rulebasedsubjectset?view=graph-rest-beta#supported-user-properties-and-query-parameters)
7171

7272
:::image type="content" source="media/tutorial-lifecycle-workflows/review-tasks.png" alt-text="Screenshot of selecting review tasks." lightbox="media/tutorial-lifecycle-workflows/review-tasks.png":::
7373

articles/active-directory/governance/tutorial-scheduled-leaver-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Use the following steps to create a scheduled leaver workflow that will configur
5050
7. Next, you will configure the basic information about the workflow. This information includes when the workflow will trigger, known as **Days from event**. So in this case, the workflow will trigger seven days after the employee's leave date. On the post-offboarding of an employee screen, add the following settings and then select **Next: Configure Scope**.
5151
:::image type="content" source="media/tutorial-lifecycle-workflows/leaver-basics.png" alt-text="Screenshot of leaver template basics information for a workflow." lightbox="media/tutorial-lifecycle-workflows/leaver-basics.png":::
5252

53-
8. Next, you will configure the scope. The scope determines which users this workflow will run against. In this case, it will be on all users in the Marketing department. On the configure scope screen, under **Rule** add the following and then select **Next: Review tasks**.
53+
8. Next, you will configure the scope. The scope determines which users this workflow will run against. In this case, it will be on all users in the Marketing department. On the configure scope screen, under **Rule** add the following and then select **Next: Review tasks**. For a full list of supported user properties, see: [Supported user properties and query parameters](/graph/api/resources/identitygovernance-rulebasedsubjectset?view=graph-rest-beta#supported-user-properties-and-query-parameters)
5454
:::image type="content" source="media/tutorial-lifecycle-workflows/leaver-scope.png" alt-text="Screenshot of reviewing scope details for a leaver workflow." lightbox="media/tutorial-lifecycle-workflows/leaver-scope.png":::
5555

5656
9. On the following page, you may inspect the tasks if desired but no additional configuration is needed. Select **Next: Select users** when you are finished.

articles/attestation/claim-sets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,7 @@ The following claims are additionally supported by the SevSnpVm attestation type
199199
200200
- **x-ms-sevsnpvm-authorkeydigest**: SHA384 hash of the author signing key
201201
- **x-ms-sevsnpvm-bootloader-svn** :AMD boot loader security version number (SVN)
202-
- **x-ms-sevsnpvm-familyId**: HCL family identification string
202+
- **x-ms-sevsnpvm-familyId**: Host Compatibility Layer (HCL) family identification string
203203
- **x-ms-sevsnpvm-guestsvn**: HCL security version number (SVN)
204204
- **x-ms-sevsnpvm-hostdata**: Arbitrary data defined by the host at VM launch time
205205
- **x-ms-sevsnpvm-idkeydigest**: SHA384 hash of the identification signing key

articles/azure-arc/kubernetes/tutorial-use-gitops-connected-cluster.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
---
22
title: 'Tutorial: Deploy configurations using GitOps on an Azure Arc-enabled Kubernetes cluster'
33
description: This tutorial demonstrates applying configurations on an Azure Arc-enabled Kubernetes cluster. For a conceptual take on this process, see the Configurations and GitOps - Azure Arc-enabled Kubernetes article.
4-
author: csand-msft
5-
ms.author: csand
64
ms.service: azure-arc
75
ms.topic: tutorial
86
ms.date: 05/24/2022

articles/cognitive-services/Computer-vision/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Learn what's new in the service. These items may be release notes, videos, blog
2020

2121
### Computer Vision Image Analysis 4.0 public preview
2222

23-
Version 4.0 of Computer Vision has been released in public preview. The new API includes image captioning, image tagging, object detection people detection, and Read OCR functionality, available in the same Analyze Image operation. The OCR is optimized for general, non-document images in a performance-enhanced synchronous API that makes it easier to embed OCR-powered experiences in your workflows.
23+
Image Analysis 4.0 has been released in public preview. The new API includes image captioning, image tagging, object detection, smart crops, people detection, and Read OCR functionality, all available through one Analyze Image operation. The OCR is optimized for general, non-document images in a performance-enhanced synchronous API that makes it easier to embed OCR-powered experiences in your workflows.
2424

2525
## September 2022
2626

articles/cognitive-services/language-service/personally-identifiable-information/includes/identification-entities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ This category contains the following entity:
114114

115115
IBAN codes for payment instruction information. Also returned with `domain=phi`.
116116

117-
To get this entity category, add `InternationalBankingAccountNumber` to the `piiCategories` parameter. `InternationlBankingAccountNumber` will be returned in the API response if detected.
117+
To get this entity category, add `InternationalBankingAccountNumber` to the `piiCategories` parameter. `InternationalBankingAccountNumber` will be returned in the API response if detected.
118118
119119
:::column-end:::
120120
:::column span="2":::

0 commit comments

Comments
 (0)