Skip to content

Commit 50f8506

Browse files
authored
Merge pull request #219047 from MicrosoftDocs/main
11/18 PM Publish
2 parents 07dde3a + 11f5ee7 commit 50f8506

File tree

152 files changed

+2134
-1151
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

152 files changed

+2134
-1151
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7028,6 +7028,11 @@
70287028
"redirect_url": "/azure/azure-functions/functions-monitoring",
70297029
"redirect_document_id": false
70307030
},
7031+
{
7032+
"source_path_from_root": "/articles/azure-functions/azure-functions-az-redundancy.md",
7033+
"redirect_url": "/azure/reliability/reliability-functions",
7034+
"redirect_document_id": false
7035+
},
70317036
{
70327037
"source_path_from_root": "/articles/azure-government/documentation-government-k8.md",
70337038
"redirect_url": "/azure/azure-government",

articles/active-directory/reports-monitoring/reference-audit-activities.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -369,6 +369,7 @@ This article lists the audit activities that can be logged in your audit logs.
369369
|Application Management|AdminUserJourneys-GetResources|
370370
|Directory Management|AdminUserJourneys-RemoveResources|
371371
|Directory Management|AdminUserJourneys-SetResources|
372+
|Directory Management|Create company|
372373
|Directory Management|Create IdentityProvider|
373374
|Directory Management|Create a new AdminUserJourney|
374375
|Directory Management|Create localized resource json|

articles/active-directory/saas-apps/arcgis-tutorial.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 06/18/2021
12+
ms.date: 11/18/2022
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure Active Directory integration with ArcGIS Online
@@ -119,7 +119,15 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
119119

120120
## Configure ArcGIS Online SSO
121121

122-
1. If you want to setup ArcGIS Online manually, open a new web browser window and log into your ArcGIS company site as an administrator and perform the following steps:
122+
1. To automate the configuration within ArcGIS Online, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
123+
124+
![My apps extension](common/install-myappssecure-extension.png)
125+
126+
1. After adding extension to the browser, click on **Set up ArcGIS Online** will direct you to the ArcGIS Online application. From there, provide the admin credentials to sign in to ArcGIS Online. The browser extension will automatically configure the application for you and automate steps 3-7.
127+
128+
![Setup configuration](common/setup-sso.png)
129+
130+
1. If you want to setup ArcGIS Online manually, open a new web browser window and log into your ArcGIS Online company site as an administrator and perform the following steps:
123131

124132
2. Go to the **Organization** -> **Settings**.
125133

articles/active-directory/saas-apps/citrix-cloud-saml-sso-tutorial.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 07/22/2021
12+
ms.date: 11/18/2022
1313
ms.author: jeedes
1414

1515
---
@@ -135,7 +135,15 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
135135

136136
## Configure Citrix Cloud SAML SSO
137137

138-
1. Log in to your Citrix Cloud SAML SSO company site as an administrator.
138+
1. To automate the configuration within Citrix Cloud SAML SSO, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
139+
140+
![My apps extension](common/install-myappssecure-extension.png)
141+
142+
1. After adding extension to the browser, click on **Set up Citrix Cloud SAML SSO** will direct you to the Citrix Cloud SAML SSO application. From there, provide the admin credentials to sign in to Citrix Cloud SAML SSO. The browser extension will automatically configure the application for you and automate steps 3-6.
143+
144+
![Setup configuration](common/setup-sso.png)
145+
146+
1. If you want to set up Citrix Cloud SAML SSO manually, log in to your Citrix Cloud SAML SSO company site as an administrator.
139147

140148
1. Navigate to the Citrix Cloud menu and select **Identity and Access Management**.
141149

articles/active-directory/saas-apps/embed-signage-tutorial.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 10/01/2021
12+
ms.date: 11/18/2022
1313
ms.author: jeedes
1414

1515
---
@@ -116,7 +116,15 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
116116

117117
## Configure embed signage SSO
118118

119-
1. Log in to your embed signage company site as an administrator.
119+
1. To automate the configuration within Embed Signage, you need to install **My Apps Secure Sign-in browser extension** by clicking **Install the extension**.
120+
121+
![My apps extension](common/install-myappssecure-extension.png)
122+
123+
1. After adding extension to the browser, click on **Set up Embed Signage** will direct you to the Embed Signage application. From there, provide the admin credentials to sign in to Embed Signage. The browser extension will automatically configure the application for you and automate steps 3-5.
124+
125+
![Setup configuration](common/setup-sso.png)
126+
127+
1. If you want to set up Embed Signage manually, log in to your Embed Signage company site as an administrator.
120128

121129
1. Go to **Account settings** and click **Security** > **Single sign on**.
122130

articles/active-directory/saas-apps/sharepoint-on-premises-tutorial.md

Lines changed: 36 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 03/31/2021
12+
ms.date: 11/14/2022
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Implement federated authentication between Azure Active Directory and SharePoint on-premises
@@ -343,4 +343,38 @@ $t.Update()
343343

344344
1. In the section **Reply URL (Assertion Consumer Service URL)**, add the URL (for example, `https://otherwebapp.contoso.local/`) of all additional web applications that need to sign in users with Azure Active Directory and click **Save**.
345345

346-
![Specify additional web applications](./media/sharepoint-on-premises-tutorial/azure-active-directory-app-reply-urls.png)
346+
![Specify additional web applications](./media/sharepoint-on-premises-tutorial/azure-active-directory-app-reply-urls.png)
347+
348+
### Configure the lifetime of the security token
349+
350+
By default, Azure AD creates a SAML token that is valid for 1 hour.
351+
This lifetime cannot be customized in the Azure portal, or using a conditional access policy, but it can be done by creating a [custom token lifetime policy](../develop/active-directory-configurable-token-lifetimes.md) and apply it to the enterprise application created for SharePoint.
352+
To do this, complete the steps below using Windows PowerShell (at the time of this writing, AzureADPreview v2.0.2.149 does not work with PowerShell Core):
353+
354+
1. Install the module [AzureADPreview](https://www.powershellgallery.com/packages/AzureADPreview/):
355+
356+
```powershell
357+
Install-Module -Name AzureADPreview -Scope CurrentUser
358+
```
359+
360+
1. Run `Connect-AzureAD` to sign-in as a tenant administrator.
361+
362+
1. Run the sample script below to update the application `SharePoint corporate farm` to issue a SAML token valid for 6h (value `06:00:00` of property `AccessTokenLifetime`):
363+
364+
```powershell
365+
$appDisplayName = "SharePoint corporate farm"
366+
367+
$sp = Get-AzureADServicePrincipal -Filter "DisplayName eq '$appDisplayName'"
368+
$oldPolicy = Get-AzureADServicePrincipalPolicy -Id $sp.ObjectId | ?{$_.Type -eq "TokenLifetimePolicy"}
369+
if ($null -ne $oldPolicy) {
370+
# There can be only 1 TokenLifetimePolicy associated to the service principal (or 0, as by default)
371+
Remove-AzureADServicePrincipalPolicy -Id $sp.ObjectId -PolicyId $oldPolicy.Id
372+
}
373+
374+
# Create a custom TokenLifetimePolicy in Azure AD and add it to the service principal
375+
$policy = New-AzureADPolicy -Definition @('{"TokenLifetimePolicy":{"Version":1,"AccessTokenLifetime":"06:00:00"}}') -DisplayName "Custom token lifetime policy" -IsOrganizationDefault $false -Type "TokenLifetimePolicy"
376+
Add-AzureADServicePrincipalPolicy -Id $sp.ObjectId -RefObjectId $policy.Id
377+
```
378+
379+
After the script completed, all users who successfully sign-in to the enterprise application will get a SAML 1.1 token valid for 6h in SharePoint.
380+
To revert the change, simply remove the custom `TokenLifetimePolicy` object from the service principal, as done at the beginning of the script.

articles/aks/aks-support-help.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ If you can't find an answer to your problem using search, submit a new question
3636
| [Azure RBAC](../role-based-access-control/overview.md) | [azure-rbac](/answers/topics/azure-rbac.html)|
3737
| [Azure Active Directory](../active-directory/fundamentals/active-directory-whatis.md) | [azure-active-directory](/answers/topics/azure-active-directory.html)|
3838
| [Azure Policy](../governance/policy/overview.md) | [azure-policy](/answers/topics/azure-policy.html)|
39-
| [Azure Virtual Machine Scale Sets](../virtual-machine-scale-sets/overview.md) | [virtual-machine-scale-sets](/answers/topics/azure-virtual-machine-scale-sets.html)|
39+
| [Azure Virtual Machine Scale Sets](../virtual-machine-scale-sets/overview.md) | [virtual-machine-scale-sets](/answers/topics/123/azure-virtual-machines-scale-set.html)|
4040
| [Azure Virtual Network](../virtual-network/network-overview.md) | [azure-virtual-network](/answers/topics/azure-virtual-network.html)|
4141
| [Azure Application Gateway](../application-gateway/overview.md) | [azure-application-gateway](/answers/topics/azure-application-gateway.html)|
4242
| [Azure Virtual Machines](../virtual-machines/linux/overview.md) | [azure-virtual-machines](/answers/topics/azure-virtual-machines.html) |
@@ -78,4 +78,4 @@ News and information about Azure Virtual Machines is shared at the [Azure blog](
7878

7979
## Next steps
8080

81-
Learn more about [Azure Kubernetes Service](./index.yml)
81+
Learn more about [Azure Kubernetes Service](./index.yml)

0 commit comments

Comments
 (0)