You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/azure-monitor.md
+8-2Lines changed: 8 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.workload: identity
11
11
ms.topic: how-to
12
12
ms.author: kengaderdus
13
13
ms.subservice: B2C
14
-
ms.date: 02/09/2022
14
+
ms.date: 02/23/2022
15
15
---
16
16
17
17
# Monitor Azure AD B2C with Azure Monitor
@@ -147,7 +147,9 @@ After you've deployed the template and waited a few minutes for the resource pro
147
147
1. Sign in to the [Azure portal](https://portal.azure.com) with your **Azure AD B2C** administrative account. This account must be a member of the security group you specified in the [Delegate resource management](#3-delegate-resource-management) step.
148
148
1. Select the **Directories + subscriptions** icon in the portal toolbar.
149
149
1. On the **Portal settings | Directories + subscriptions** page, in the **Directory name** list, find your Azure AD directory that contains the Azure subscription and the _azure-ad-b2c-monitor_ resource group you created, and then select **Switch**.
150
-
1. Verify that you've selected the correct directory and subscription.
150
+
1. Verify that you've selected the correct directory and your Azure subscription is listed and selected in the **Default subscription filter**.
151
+
152
+

151
153
152
154
## 5. Configure diagnostic settings
153
155
@@ -178,6 +180,10 @@ To configure monitoring settings for Azure AD B2C activity logs:
178
180
1. Check the box for each destination to send the logs. Select **Configure** to specify their settings **as described in the following table**.
179
181
1. Select **Send to Log Analytics**, and then select the **Name of workspace** you created earlier (`AzureAdB2C`).
180
182
1. Select **AuditLogs** and **SignInLogs**.
183
+
184
+
> [!NOTE]
185
+
> Only the **AuditLogs** and **SignInLogs** diagnostic settings are currently supported for Azure AD B2C tenants.
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-faqs.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ CloudKnox is a cloud infrastructure entitlement management (CIEM) solution that
28
28
29
29
## What are the prerequisites to use CloudKnox?
30
30
31
-
CloudKnox supports data collection from AWS, GCP, and/or Microsoft Azure. For data collection and analysis, customers are required to have an Azure Active Directory (Azure AD) account to use CloudKnox, however, an Azure subscription or Azure AD P1 or P2 license aren't required to use CloudKnox for AWS or GCP.
31
+
CloudKnox supports data collection from AWS, GCP, and/or Microsoft Azure. For data collection and analysis, customers are required to have an Azure Active Directory (Azure AD) account to use CloudKnox.
32
32
33
33
## Can a customer use CloudKnox if they have other identities with access to their IaaS platform that aren’t yet in Azure AD (for example, if part of their business has Okta or AWS Identity & Access Management (IAM))?
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-certificate-credentials.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ To compute the assertion, you can use one of the many JWT libraries in the langu
34
34
| --- | --- |
35
35
|`alg`| Should be **RS256**|
36
36
|`typ`| Should be **JWT**|
37
-
|`x5t`|The X.509 certificate hash's (also known as the cert's SHA-1 *thumbprint*) Hex representation encoded as a Base64url string value. For example, given an X.509 certificate hash of `84E05C1D98BCE3A5421D225B140B36E86A3D5534` (Hex), the `x5t` claim would be `hOBcHZi846VCHSJbFAs26Go9VTQ=` (Base64url). |
37
+
|`x5t`|Base64url-encoded SHA-1 thumbprint of the X.509 certificate thumbprint. For example, given an X.509 certificate hash of `84E05C1D98BCE3A5421D225B140B36E86A3D5534` (Hex), the `x5t` claim would be `hOBcHZi846VCHSJbFAs26Go9VTQ=` (Base64url). |
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/b2b-tutorial-require-mfa.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -132,6 +132,9 @@ To complete the scenario in this tutorial, you need:
132
132
133
133

134
134
135
+
> [!NOTE]
136
+
> You also can configure [cross-tenant access settings](cross-tenant-access-overview.md) to trust the MFA from the Azure AD home tenant. This allows external Azure AD users to use the MFA registered in their own tenant rather than register in the resource tenant.
First, create a new project in the Google Developers Console to obtain a client ID and a client secret that you can later add to Azure Active Directory (Azure AD).
142
142
1. Go to the Google APIs at https://console.developers.google.com, and sign in with your Google account. We recommend that you use a shared team Google account.
143
-
2. Accept the terms of service if you're prompted to do so.
144
-
3. Create a new project: In the upper-left corner of the page, select the project list, and then on the **Select a project** page, select **New Project**.
145
-
4. On the **New Project** page, give the project a name (for example, **Azure AD B2B**), and then select **Create**:
143
+
144
+
1. Accept the terms of service if you're prompted to do so.
145
+
146
+
1. Create a new project: At the top of the page, select the project menu to open the **Select a project** page. Choose **New Project**.
147
+
148
+
1. On the **New Project** page, give the project a name (for example, `MyB2BApp`), and then select **Create**:
146
149
147
150

148
151
149
-
4. On the **APIs & Services** page, select **View**under your new project.
152
+
1. Open the new project by selecting the link in the **Notifications**message box or by using the project menu at the top of the page.
150
153
151
-
5. Select **Go to APIs overview** on the APIs card. Select**OAuth consent screen**.
154
+
1. In the left menu, select **APIs & Services**, and then select**OAuth consent screen**.
152
155
153
-
6. Select**External**, and then select **Create**.
156
+
1. Under**User Type**, select **External**, and then select **Create**.
154
157
155
-
7. On the **OAuth consent screen**, enter an **Application name**:
158
+
1. On the **OAuth consent screen**, under **App information**, enter an **App name**.
156
159
157
-

160
+
1. Under **User support email**, select an email address.
158
161
159
-
8. Scroll to the **Authorized domains** section and enter **microsoftonline.com**:
162
+
1. Under **Authorized domains**, select **Add domain**, and then add the `microsoftonline.com` domain.
160
163
161
-

164
+
1. Under **Developer contact information**, enter an email address.
162
165
163
-
9. Select **Save**.
166
+
1. Select **Save and continue**.
164
167
165
-
10. Select **Credentials**. On the **Create credentials**menu, select **OAuth client ID**:
168
+
1. In the left menu, select **Credentials**.
166
169
167
-

170
+
1. Select **Create credentials**, and then select **OAuth client ID**.
171
+
172
+
1. In the Application type menu, select **Web application**. Give the application a suitable name, like `Azure AD B2B`. Under **Authorized redirect URIs**, add the following URIs:
168
173
169
-
11. Under **Application type**, select **Web application**. Give the application a suitable name, like **Azure AD B2B**. Under **Authorized redirect URIs**, enter the following URIs:
170
174
-`https://login.microsoftonline.com`
171
175
-`https://login.microsoftonline.com/te/<tenant ID>/oauth2/authresp` <br>(where `<tenant ID>` is your tenant ID)
172
176
-`https://login.microsoftonline.com/te/<tenant name>.onmicrosoft.com/oauth2/authresp` <br>(where `<tenant name>` is your tenant name)
173
177
174
178
> [!NOTE]
175
179
> To find your tenant ID, go to the [Azure portal](https://portal.azure.com). Under **Azure Active Directory**, select **Properties** and copy the **Tenant ID**.
176
180
177
-

178
-
179
-
12. Select **Create**. Copy the client ID and client secret. You'll use them when you add the identity provider in the Azure portal.
181
+
1. Select **Create**. Copy your client ID and client secret. You'll use them when you add the identity provider in the Azure portal.
180
182
181
183

182
184
183
-
13. You can leave your project at a publishing status of **Testing** and add test users to the OAuth consent screen. Or you can select the **Publish app** button on the OAuth consent screen to make the app available to any user with a Google Account.
185
+
1. You can leave your project at a publishing status of **Testing** and add test users to the OAuth consent screen. Or you can select the **Publish app** button on the OAuth consent screen to make the app available to any user with a Google Account.
184
186
185
187
## Step 2: Configure Google federation in Azure AD
186
188
@@ -190,7 +192,7 @@ You'll now set the Google client ID and client secret. You can use the Azure por
190
192
1. Go to the [Azure portal](https://portal.azure.com). On the left pane, select **Azure Active Directory**.
191
193
2. Select **External Identities**.
192
194
3. Select **All identity providers**, and then select the **Google** button.
193
-
4. Enter the client ID and client secret you obtained earlier. Select **Save**:
195
+
4. Enter the client ID and client secret you obtained earlier. Select **Save**:
194
196
195
197

0 commit comments