Skip to content

Commit 4f185f9

Browse files
authored
Merge pull request #162921 from MicrosoftDocs/master
Merge Master to Live, 4 AM
2 parents 6a3096e + 2b8cd21 commit 4f185f9

File tree

173 files changed

+1927
-646
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

173 files changed

+1927
-646
lines changed

.openpublishing.redirection.json

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31371,18 +31371,18 @@
3137131371
"redirect_document_id": false
3137231372
},
3137331373
{
31374-
"source_path_from_root": "/articles/articles/mysql/concepts-data-access-and-security-threat-protection.md",
31375-
"redirect_url": "/azure/security-center/defender-for-databases-introduction",
31374+
"source_path_from_root": "/articles/mysql/concepts-data-access-and-security-threat-protection.md",
31375+
"redirect_url": "/azure/security-center/defender-for-databases-usage",
3137631376
"redirect_document_id": false
3137731377
},
3137831378
{
3137931379
"source_path_from_root": "/articles/mariadb/concepts-data-access-and-security-threat-protection.md",
31380-
"redirect_url": "/azure/security-center/defender-for-databases-introduction",
31380+
"redirect_url": "/azure/security-center/defender-for-databases-usage",
3138131381
"redirect_document_id": false
3138231382
},
3138331383
{
3138431384
"source_path_from_root": "/articles/postgresql/concepts-data-access-and-security-threat-protection.md",
31385-
"redirect_url": "/azure/security-center/defender-for-databases-introduction",
31385+
"redirect_url": "/azure/security-center/defender-for-databases-usage",
3138631386
"redirect_document_id": false
3138731387
},
3138831388
{
@@ -64673,6 +64673,11 @@
6467364673
"source_path_from_root": "/articles/storage/files/storage-troubleshoot-cannot-delete-files-azure-file-share.md",
6467464674
"redirect_url": "/azure/storage/files/storage-troubleshoot-windows-file-connection-problems#unable-to-modify-moverename-or-delete-a-file-or-directory",
6467564675
"redirect_document_id": false
64676+
},
64677+
{
64678+
"source_path_from_root": "/articles/cognitive-services/metrics-advisor/how-tos/diagnose-incident.md",
64679+
"redirect_url": "/azure/cognitive-services/metrics-advisor/how-tos/diagnose-an-incident",
64680+
"redirect_document_id": false
6467664681
}
6467764682
]
6467864683
}

articles/active-directory-b2c/authorization-code-flow.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 05/04/2021
11+
ms.date: 06/18/2021
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -62,7 +62,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
6262
| client_id |Required |The application ID assigned to your app in the [Azure portal](https://portal.azure.com). |
6363
| response_type |Required |The response type, which must include `code` for the authorization code flow. |
6464
| redirect_uri |Required |The redirect URI of your app, where authentication responses are sent and received by your app. It must exactly match one of the redirect URIs that you registered in the portal, except that it must be URL-encoded. |
65-
| scope |Required |A space-separated list of scopes. A single scope value indicates to Azure Active Directory (Azure AD) both of the permissions that are being requested. Using the client ID as the scope indicates that your app needs an access token that can be used against your own service or web API, represented by the same client ID. The `offline_access` scope indicates that your app needs a refresh token for long-lived access to resources. You also can use the `openid` scope to request an ID token from Azure AD B2C. |
65+
| scope |Required |A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. The `offline_access` scope is optional for web applications. It indicates that your application will need a *refresh token* for extended access to resources. The `https://{tenant-name}/{app-id-uri}/{scope}` indicates a permission to protected resources, such as a web API. For more information, see [Request an access token](access-tokens.md#scopes). |
6666
| response_mode |Recommended |The method that you use to send the resulting authorization code back to your app. It can be `query`, `form_post`, or `fragment`. |
6767
| state |Recommended |A value included in the request that can be a string of any content that you want to use. Usually, a randomly generated unique value is used, to prevent cross-site request forgery attacks. The state also is used to encode information about the user's state in the app before the authentication request occurred. For example, the page the user was on, or the user flow that was being executed. |
6868
| prompt |Optional |The type of user interaction that is required. Currently, the only valid value is `login`, which forces the user to enter their credentials on that request. Single sign-on will not take effect. |

articles/active-directory-b2c/conditional-access-technical-profile.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: celestedg
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 05/13/2021
12+
ms.date: 06/18/2021
1313
ms.author: mimart
1414
ms.subservice: B2C
1515
---
@@ -69,8 +69,8 @@ The **OutputClaims** element contains a list of claims generated by the Conditio
6969

7070
| ClaimReferenceId | Required | Data Type | Description |
7171
| --------- | -------- | ----------- |----------- |
72-
| Challenges | Yes |stringCollection | List of actions to remediate the identified threat. Possible values: `block` |
73-
| MultiConditionalAccessStatus | Yes | stringCollection | |
72+
| Challenges | Yes |stringCollection | List of actions to remediate the identified threat. Possible values: `block` , `mfa`, and `chg_pwd`. |
73+
| MultiConditionalAccessStatus | Yes | stringCollection | The status of conditional access evaluation. |
7474

7575
The **OutputClaimsTransformations** element may contain a collection of **OutputClaimsTransformation** elements that are used to modify the output claims or generate new ones.
7676

articles/active-directory-b2c/openid-connect.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: celestedg
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: conceptual
11-
ms.date: 03/15/2021
11+
ms.date: 06/18/2021
1212
ms.author: mimart
1313
ms.subservice: B2C
1414
ms.custom: fasttrack-edit
@@ -51,7 +51,7 @@ client_id=90c0fe63-bcf2-44d5-8fb7-b8bbc0b29dc6
5151
| client_id | Yes | The application ID that the [Azure portal](https://portal.azure.com/) assigned to your application. |
5252
| nonce | Yes | A value included in the request (generated by the application) that is included in the resulting ID token as a claim. The application can then verify this value to mitigate token replay attacks. The value is typically a randomized unique string that can be used to identify the origin of the request. |
5353
| response_type | Yes | Must include an ID token for OpenID Connect. If your web application also needs tokens for calling a web API, you can use `code+id_token`. |
54-
| scope | Yes | A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. The `offline_access` scope is optional for web applications. It indicates that your application will need a *refresh token* for extended access to resources. |
54+
| scope | Yes | A space-separated list of scopes. The `openid` scope indicates a permission to sign in the user and get data about the user in the form of ID tokens. The `offline_access` scope is optional for web applications. It indicates that your application will need a *refresh token* for extended access to resources. The `https://{tenant-name}/{app-id-uri}/{scope}` indicates a permission to protected resources, such as a web API. For more information, see [Request an access token](access-tokens.md#scopes). |
5555
| prompt | No | The type of user interaction that's required. The only valid value at this time is `login`, which forces the user to enter their credentials on that request. |
5656
| redirect_uri | No | The `redirect_uri` parameter of your application, where authentication responses can be sent and received by your application. It must exactly match one of the `redirect_uri` parameters that you registered in the Azure portal, except that it must be URL encoded. |
5757
| response_mode | No | The method that is used to send the resulting authorization code back to your application. It can be either `query`, `form_post`, or `fragment`. The `form_post` response mode is recommended for best security. |
@@ -292,4 +292,4 @@ To set the required ID Token in logout requests, see [Configure session behavior
292292

293293
## Next steps
294294

295-
- Learn more about [Azure AD B2C session](session-behavior.md).
295+
- Learn more about [Azure AD B2C session](session-behavior.md).

articles/active-directory/develop/howto-restrict-your-app-to-a-set-of-users.md

Lines changed: 12 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.date: 09/24/2018
1313
ms.author: kkrishna
1414
ms.reviewer: jmprieur
1515
ms.custom: aaddev
16-
#Customer intent: As a tenant administrator, I want to restrict an application that I have registered in Azure AD to a select set of users available in my Azure AD tenant
16+
#Customer intent: As a tenant administrator, I want to restrict an application that I have registered in Azuren-e AD to a select set of users available in my Azure AD tenant
1717
---
1818
# How to: Restrict your Azure AD app to a set of users in an Azure AD tenant
1919

@@ -36,46 +36,34 @@ The option to restrict an app to a specific set of users or security groups in a
3636
> [!NOTE]
3737
> This feature is available for web app/web API and enterprise applications only. Apps that are registered as [native](./quickstart-register-app.md) cannot be restricted to a set of users or security groups in the tenant.
3838
39-
## Update the app to enable user assignment
39+
## Update the app to require user assignment
4040

41-
There are two ways to create an application with enabled user assignment. One requires the **Global Administrator** role, the second does not.
41+
To update an application to require user assignment, you must be owner of the application under Enterprise apps, or be assigned one of **Global administrator**, **Application administrator** or **Cloud application administrator** directory roles.
4242

43-
### Enterprise applications (requires the Global Administrator role)
44-
45-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a> as a **Global Administrator**.
43+
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
4644
1. If you have access to multiple tenants, use the **Directory + subscription** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant in which you want to register an application.
4745
1. Search for and select **Azure Active Directory**.
4846
1. Under **Manage**, select **Enterprise Applications** > **All applications**.
49-
1. Select the application you want to assign a user or a security group to from the list.
50-
Use the filters at the top of the window to search for a specific application.
47+
1. Select the application you want to configure to require assignment. Use the filters at the top of the window to search for a specific application.
5148
1. On the application's **Overview** page, under **Manage**, select **Properties**.
52-
1. Locate the setting **User assignment required?** and set it to **Yes**. When this option is set to **Yes**, users in the tenant must first be assigned to this application or they won't be able to sign-in to this application.
49+
1. Locate the setting **User assignment required?** and set it to **Yes**. When this option is set to **Yes**, users and services attempting to access the application or services must first be assigned for this application, or they won't be able to sign-in or obtain an access token.
5350
1. Select **Save**.
5451

55-
### App registration
56-
57-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
58-
1. If you have access to multiple tenants, use the **Directory + subscription** filter :::image type="icon" source="./media/common/portal-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant in which you want to register an application.
59-
1. Search for and select **Azure Active Directory**.
60-
1. Under **Manage**, select **App registrations**.
61-
1. Create or select the app you want to manage. You need to be the **Owner** of this application.
62-
1. On the application's **Overview** page, select the **Managed application in local directory** link in the **Essentials** section.
63-
1. Under **Manage**, select **Properties**.
64-
1. Locate the setting **User assignment required?** and set it to **Yes**. When this option is set to **Yes**, users in the tenant must first be assigned to this application or they won't be able to sign-in to this application.
65-
1. Select **Save**.
52+
> [!NOTE]
53+
> When an application requires assignment, user consent for that application is not allowed. This is true even if users consent for that app would have otherwise been allowed. Be sure to [grant tenant-wide admin consent](../manage-apps/grant-admin-consent.md) to apps that require assignment.
6654
67-
## Assign users and groups to the app
55+
## Assign the app to users and groups
6856

69-
Once you've configured your app to enable user assignment, you can go ahead and assign users and groups to the app.
57+
Once you've configured your app to enable user assignment, you can go ahead and assign the app to users and groups.
7058

7159
1. Under **Manage**, select the **Users and groups** > **Add user/group** .
7260
1. Select the **Users** selector.
7361

7462
A list of users and security groups will be shown along with a textbox to search and locate a certain user or group. This screen allows you to select multiple users and groups in one go.
7563

7664
1. Once you are done selecting the users and groups, select **Select**.
77-
1. (Optional) If you have defined App roles in your application, you can use the **Select role** option to assign the selected users and groups to one of the application's roles.
78-
1. Select **Assign** to complete the assignments of users and groups to the app.
65+
1. (Optional) If you have defined app roles in your application, you can use the **Select role** option to assign the app role to the selected users and groups.
66+
1. Select **Assign** to complete the assignments of the app to the users and groups.
7967
1. Confirm that the users and groups you added are showing up in the updated **Users and groups** list.
8068

8169
## More information

articles/active-directory/external-identities/add-users-administrator.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ To add B2B collaboration users to the directory, follow these steps:
4646
- **Email address (required)**. The email address of the guest user.
4747
- **Personal message (optional)** Include a personal welcome message to the guest user.
4848
- **Groups**: You can add the guest user to one or more existing groups, or you can do it later.
49-
- **Roles**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role by selecting **User** next to **Roles**.
49+
- **Roles**: If you require Azure AD administrative permissions for the user, you can add them to an Azure AD role by selecting **User** next to **Roles**. [Learn more](/azure/role-based-access-control/role-assignments-external-users) about Azure roles for external guest users.
5050

5151
> [!NOTE]
5252
> Group email addresses aren’t supported; enter the email address for an individual. Also, some email providers allow users to add a plus symbol (+) and additional text to their email addresses to help with things like inbox filtering. However, Azure AD doesn’t currently support plus symbols in email addresses. To avoid delivery issues, omit the plus symbol and any characters following it up to the @ symbol.

articles/active-directory/reports-monitoring/overview-sign-in-diagnostics.md

Lines changed: 49 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: overview
1515
ms.tgt_pltfrm: na
1616
ms.workload: identity
1717
ms.subservice: report-monitor
18-
ms.date: 12/15/2020
18+
ms.date: 06/18/2021
1919
ms.author: markvi
2020
ms.reviewer: tspring
2121

@@ -170,6 +170,54 @@ In this scenario, sign-in events weren't interrupted by conditional access or mu
170170

171171
This diagnostic scenario provides details about user sign-in events that were expected to be interrupted due to conditional access policies or multifactor authentication.
172172

173+
174+
### The account is locked
175+
176+
In this scenario, a user signed-in with incorrect credentials too many times.
177+
178+
This diagnostic scenario provides details about the apps, the number of attempts, the device used, the operating system and the IP address.
179+
180+
### Incorrect Credentials Invalid username or password
181+
182+
In this scenario, a user tried to sign-in using an invalid username or password.
183+
184+
This diagnostic scenario provides details about the apps, the number of attempts, the device used, the operating system and the IP address.
185+
186+
### Enterprise apps service provider
187+
188+
In this scenario, a user tried to sign-in to an app, which failed due to a problem with the service provider problem.
189+
190+
### Enterprise apps configuration
191+
192+
In this scenario, a sign-in failed due to an application configuration issue.
193+
194+
#### Error code insights
195+
196+
When an event does not have a contextual analysis in the Sign-in Diagnostic an updated error code explanation and relevant content may be shown. The error code insights will contain detailed text about the scenario, how to remediate the problem and any content to read regarding the problem.
197+
198+
#### Legacy Authentication
199+
200+
This diagnostics scenario diagnosis a sign-in event which was blocked or interrupted since the client was attempting to use Basic (also known as Legacy) Authentication.
201+
202+
Preventing legacy authentication sign-in is recommended as a best practice for security. Legacy authentication protocols like POP, SMTP, IMAP, and MAPI cannot enforce Multi-Factor Authentication (MFA) which makes them preferred entry points for adversaries to attack your organization.
203+
204+
#### B2B Blocked Sign-in
205+
206+
This diagnostic scenario detects a blocked or interrupted sign-in due to the user being from another organization-a B2B sign-in-where a Conditional Access policy requires that the clients device is joined to the resource tenant.
207+
208+
#### Blocked by Risk Policy
209+
210+
This scenario is where Identity Protection Policy blocks a sign-in attempt due to the sign-in attempt having been identified as risky.
211+
212+
### Security Defaults
213+
214+
This scenario covers sign-in events where the user’s sign-in was interrupted due to Security Defaults settings. Security Defaults enforce best practice security for your organization and will require Multi-Factor Authentication (MFA) to be configured and used in many scenarios to prevent password sprays, replay attacks and phishing attempts from being successful.
215+
216+
217+
218+
219+
220+
173221
## Next steps
174222

175223
- [What are Azure Active Directory reports?](overview-reports.md)

articles/active-directory/roles/delegate-by-task.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -221,7 +221,7 @@ In this article, you can find the information needed to restrict a user's admini
221221
> [!div class="mx-tableFixed"]
222222
> | Task | Least privileged role | Additional roles |
223223
> | ---- | --------------------- | ---------------- |
224-
> | Read sign-in logs | Reports Reader | Security Reader<br/>Security Administrator |
224+
> | Read sign-in logs | Reports Reader | Security Reader<br/>Security Administrator<br/> Global Reader |
225225
226226
## Multi-factor authentication
227227

0 commit comments

Comments
 (0)