Skip to content

Commit 512d4d5

Browse files
authored
Merge pull request #107699 from MicrosoftDocs/master
3/13 PM Publish
2 parents ba4bcea + 19ee235 commit 512d4d5

File tree

206 files changed

+4867
-2035
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

206 files changed

+4867
-2035
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -855,6 +855,11 @@
855855
"redirect_url": "/azure/cognitive-services/personalizer/how-to-manage-model",
856856
"redirect_document_id": false
857857
},
858+
{
859+
"source_path": "articles/cognitive-services/LUIS/luis-resources-faq.md",
860+
"redirect_url": "/azure/cognitive-services/LUIS/troubleshooting",
861+
"redirect_document_id": false
862+
},
858863
{
859864
"source_path": "articles/cognitive-services/LUIS/luis-tutorial-bot-csharp-appinsights.md",
860865
"redirect_url": "/azure/cognitive-services/LUIS/luis-csharp-tutorial-bf-v4",

articles/active-directory/manage-apps/howto-saml-token-encryption.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,12 +13,12 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: conceptual
16-
ms.date: 02/06/2019
16+
ms.date: 03/13/2020
1717
ms.author: mimart
1818
ms.reviewer: paulgarn
1919
ms.collection: M365-identity-device-management
2020
---
21-
# How to: Configure Azure AD SAML token encryption (Preview)
21+
# How to: Configure Azure AD SAML token encryption
2222

2323
> [!NOTE]
2424
> Token encryption is an Azure Active Directory (Azure AD) premium feature. To learn more about Azure AD editions, features, and pricing, see [Azure AD pricing](https://azure.microsoft.com/pricing/details/active-directory/).
@@ -118,9 +118,6 @@ When you configure a keyCredential using Graph, PowerShell, or in the applicatio
118118
119119
### To configure token encryption using PowerShell
120120
121-
This functionality is coming soon.
122-
123-
<!--
124121
1. Use the latest Azure AD PowerShell module to connect to your tenant.
125122
126123
1. Set the token encryption settings using the **[Set-AzureApplication](https://docs.microsoft.com/powershell/module/azuread/set-azureadapplication?view=azureadps-2.0-preview)** command.
@@ -137,8 +134,6 @@ This functionality is coming soon.
137134
$app.TokenEncryptionKeyId
138135
```
139136
140-
-->
141-
142137
### To configure token encryption using the application manifest
143138
144139
1. From the Azure portal, go to **Azure Active Directory > App registrations**.

articles/active-directory/manage-apps/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@
6868
href: manage-certificates-for-federated-single-sign-on.md
6969
- name: Tenant restrictions
7070
href: tenant-restrictions.md
71-
- name: Configure SAML token encryption (Preview)
71+
- name: Configure SAML token encryption
7272
href: howto-saml-token-encryption.md
7373
- name: End-user portals
7474
href: end-user-experiences.md

articles/active-directory/manage-apps/what-is-single-sign-on.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ The following table summarizes the single sign-on methods, and links to more det
4242
| [SAML](#saml-sso) | cloud and on-premises | Choose SAML whenever possible for existing applications that do not use OpenID Connect or OAuth. SAML works for applications that authenticate using one of the SAML protocols.|
4343
| [Password-based](#password-based-sso) | cloud and on-premises | Choose password-based when the application authenticates with username and password. Password-based single sign-on enables secure application password storage and replay using a web browser extension or mobile app. This method uses the existing sign-in process provided by the application, but enables an administrator to manage the passwords. |
4444
| [Linked](#linked-sign-on) | cloud and on-premises | Choose linked sign-on when the application is configured for single sign-on in another identity provider service. This option doesn't add single sign-on to the application. However, the application might already have single sign-on implemented using another service such as Active Directory Federation Services.|
45-
| [Disabled](#disabled-sso) | cloud and on-premises | Choose disabled single sign-on when the app isn't ready to be configured for single sign-on. Users need to enter their username and password every time they launch this application.|
45+
| [Disabled](#disabled-sso) | cloud and on-premises | Choose disabled single sign-on when the app isn't ready to be configured for single sign-on. This mode is the default when you create the app.|
4646
| [Integrated Windows Authentication (IWA)](#integrated-windows-authentication-iwa-sso) | on-premises only | Choose IWA single sign-on for applications that use [Integrated Windows Authentication (IWA)](/aspnet/web-api/overview/security/integrated-windows-authentication), or claims-aware applications. For IWA, the Application Proxy connectors use Kerberos Constrained Delegation (KCD) to authenticate users to the application. |
4747
| [Header-based](#header-based-sso) | on-premises only | Use header-based single sign-on when the application uses headers for authentication. Header-based single sign-on requires PingAccess for Azure AD. Application Proxy uses Azure AD to authenticate the user and then passes traffic through the connector service. |
4848

@@ -143,6 +143,8 @@ Use disabled single sign-on mode:
143143
- If you're testing other aspects of the application, or
144144
- As a layer of security to an on-premises application that doesn't require users to authenticate. With disabled, the user needs to authenticate.
145145

146+
Note that if you have configured the application for SP-initiated SAML based single sign-on and you change the SSO mode to disable, it won't stop users from signing to the application outside the MyApps portal. To achieve this, you need to [disable the ability for users to sign-in](disable-user-sign-in-portal.md)
147+
146148
## Integrated Windows Authentication (IWA) SSO
147149

148150
[Application Proxy](application-proxy.md) provides single sign-on (SSO) to applications that use [Integrated Windows Authentication (IWA)](/aspnet/web-api/overview/security/integrated-windows-authentication), or claims-aware applications. If your application uses IWA, Application Proxy authenticates to the application by using Kerberos Constrained Delegation (KCD). For a claims-aware application that trusts Azure Active Directory, single sign-on works because the user was already authenticated by using Azure AD.
412 Bytes
Loading

0 commit comments

Comments
 (0)