Skip to content

Commit 5463217

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 001f47e + 42e61a0 commit 5463217

File tree

282 files changed

+4874
-2626
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

282 files changed

+4874
-2626
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,11 @@
3535
"redirect_url": "/azure/azure-monitor/change/change-analysis",
3636
"redirect_document_id": false
3737
},
38+
{
39+
"source_path_from_root": "/articles/azure-monitor/app/release-notes.md",
40+
"redirect_url": "/azure/azure-monitor/app/app-insights-overview",
41+
"redirect_document_id": false
42+
},
3843
{
3944
"source_path_from_root": "/articles/azure-monitor/app/resource-manager-web-app.md",
4045
"redirect_url": "/previous-versions/azure/azure-monitor/app/resource-manager-web-app",

.openpublishing.redirection.json

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6313,16 +6313,6 @@
63136313
"redirect_url": "/azure/architecture/service-fabric/migrate-from-cloud-services",
63146314
"redirect_document_id": false
63156315
},
6316-
{
6317-
"source_path_from_root": "/articles/batch/batch-custom-image-pools-to-azure-compute-gallery-migration-guide.md",
6318-
"redirect_url": "/azure/batch",
6319-
"redirect_document_id": false
6320-
},
6321-
{
6322-
"source_path_from_root": "/articles/batch/batch-pools-to-simplified-compute-node-communication-model-migration-guide.md",
6323-
"redirect_url": "/azure/batch",
6324-
"redirect_document_id": false
6325-
},
63266316
{
63276317
"source_path_from_root": "/articles/batch/big-compute-resources.md",
63286318
"redirect_url": "/azure/architecture/topics/high-performance-computing/",

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -169,6 +169,11 @@
169169
"source_path_from_root": "/articles/virtual-desktop/deploy-windows-server-virtual-machine.md",
170170
"redirect_url": "/azure/virtual-desktop/add-session-hosts-host-pool",
171171
"redirect_document_id": false
172+
},
173+
{
174+
"source_path_from_root": "/articles/virtual-desktop/environment-setup.md",
175+
"redirect_url": "/azure/virtual-desktop/terminology",
176+
"redirect_document_id": false
172177
}
173178
]
174179
}
Lines changed: 91 additions & 74 deletions
Original file line numberDiff line numberDiff line change
@@ -1,105 +1,126 @@
11
---
2-
title: Tutorial for configuring Saviynt with Azure Active Directory B2C
2+
title: Tutorial to configure Saviynt with Azure Active Directory B2C
33
titleSuffix: Azure AD B2C
4-
description: Tutorial to configure Azure Active Directory B2C with Saviynt for cross application integration to streamline IT modernization and promote better security, governance, and compliance. 
4+
description: Learn to configure Azure AD B2C with Saviynt for cross-application integration for better security, governance, and compliance. 
55
services: active-directory-b2c
66
author: gargi-sinha
7-
manager: CelesteDG
7+
manager: martinco
88
ms.reviewer: kengaderdus
9-
109
ms.service: active-directory
1110
ms.workload: identity
1211
ms.topic: how-to
13-
ms.date: 09/20/2021
12+
ms.date: 03/07/2023
1413
ms.author: gasinh
1514
ms.subservice: B2C
1615
---
1716

18-
# Tutorial for configuring Saviynt with Azure Active Directory B2C
19-
20-
In this sample tutorial, we provide guidance on how to integrate Azure Active Directory (AD) B2C with [Saviynt](https://saviynt.com/integrations/azure-ad/for-b2c/). Saviynt’s Security Manager platform provides the visibility, security, and governance today’s businesses need, in a single unified platform. Saviynt incorporates application risk and governance, infrastructure management, privileged account management, and customer risk analysis.
17+
# Tutorial to configure Saviynt with Azure Active Directory B2C
2118

22-
In this sample tutorial, you'll set up Saviynt to provide fine grained access control based delegated administration for Azure AD B2C users. Saviynt does the following checks to determine if a user is authorized to manage Azure AD B2C users.
19+
Learn to integrate Azure Active Directory B2C (Azure AD B2C) with the Saviynt Security Manager platform, which has visibility, security, and governance. Saviynt incorporates application risk and governance, infrastructure management, privileged account management, and customer risk analysis.
2320

24-
- Feature level security to determine if a user can perform a specific operation. For example, Create user, Update user, Reset user password, and so on.
21+
Learn more: [Saviynt for Azure AD B2C](https://saviynt.com/integrations/azure-ad/for-b2c/)
2522

26-
- Field level security to determine if a user can read/write a specific attribute of another user during user management operations. For example, help desk agent can only update phone number and all other attributes are read-only.
23+
Use the following instructions to set up access control delegated administration for Azure AD B2C users. Saviynt determines if a user is authorized to manage Azure AD B2C users with:
2724

28-
- Data level security to determine if a user can perform a certain operation on a specific user. For example, help desk administrator for UK region can manage UK users only.
25+
* Feature level security to determine if users can perform an operation
26+
* For example, create user, update user, reset user password, and so on
27+
* Field level security to determine if users can read/write user attributes during user management operations
28+
* For example, a Help Desk agent can update a phone number; other attributes are read-only
29+
* Data level security to determine if users can perform an operation on another user
30+
* For example, a Help Desk administrator for the United Kingdom region manages UK users
2931

3032
## Prerequisites
3133

32-
To get started, you'll need:
33-
34-
- An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
35-
36-
- An [Azure AD B2C tenant](./tutorial-create-tenant.md). Tenant is linked to your Azure subscription.
34+
To get started, you need:
3735

38-
- A Saviynt [subscription](https://saviynt.com/contact-us/)
36+
* An Azure AD subscription
37+
* If you don't have on, get an [Azure free account](https://azure.microsoft.com/free/)
38+
* An [Azure AD B2C tenant](./tutorial-create-tenant.md) linked to your Azure subscription
39+
* Go to saviynt.com [Contact Us](https://saviynt.com/contact-us/) to request a demo
3940

4041
## Scenario description
4142

4243
The Saviynt integration includes the following components:
4344

44-
- [Azure AD B2C](https://azure.microsoft.com/services/active-directory/external-identities/b2c/) – The business-to-customer identity as a service that enables custom control of how your customers sign up, sign in, and manage their profiles.
45+
* **Azure AD B2C** – identity as a service for custom control of customer sign-up, sign-in, and profile management
46+
* See, [Azure AD B2C, Get started](https://azure.microsoft.com/services/active-directory/external-identities/b2c/)
47+
* **Saviynt for Azure AD B2C** – identity governance for delegated administration of user life-cycle management and access governance
48+
* See, [Saviynt for Azure AD B2C](https://saviynt.com/integrations/azure-ad/for-b2c/)
49+
* **Microsoft Graph API** – interface for Saviynt to manage Azure AD B2C users and their access
50+
* See, [Use the Microsoft Graph API](/graph/use-the-api)
51+
4552

46-
- [Saviynt](https://saviynt.com/integrations/azure-ad/for-b2c/)The identity governance platform that provides fine grained delegated administration for user life-cycle management and access governance of Azure AD B2C users.
53+
The following architecture diagram illustrates the implementation.
4754

48-
- [Microsoft Graph API](/graph/use-the-api) – This API provides the interfaces for Saviynt to manage the Azure AD B2C users and their access in Azure AD B2C.
55+
![Diagram of the Saviynt architecture.](./media/partner-saviynt/saviynt-architecture-diagram.png)
4956

50-
The following architecture diagram shows the implementation.
57+
1. A delegated administrator starts the Azure AD B2C user operation with Saviynt.
58+
2. Saviynt verifies the delegated administrator can perform the operation.
59+
3. Saviynt sends an authorization success or failure response.
60+
4. Saviynt allows the delegated administrator to perform the operation.
61+
5. Saviynt invokes Microsoft Graph API, with user attributes, to manage the user in Azure AD B2C.
62+
6. Microsoft Graph API creates, updates, or deletes the user in Azure AD B2C.
63+
7. Azure AD B2C sends a success or failure response.
64+
8. Microsoft Graph API returns the response to Saviynt.
5165

52-
![Image showing saviynt architecture diagram](./media/partner-saviynt/saviynt-architecture-diagram.png)
66+
## Create a Saviynt account and create delegated policies
5367

54-
|Step | Description |
55-
|:-----| :-----------|
56-
| 1. | A delegated administrator starts a manage Azure AD B2C user operation through Saviynt.
57-
| 2. | Saviynt verifies with its authorization engine if the delegated administrator can do the specific operation.
58-
| 3. | Saviynt’s authorization engine sends an authorization success/failure response.
59-
| 4. | Saviynt allows the delegated administrator to do the required operation.
60-
| 5. | Saviynt invokes Microsoft Graph API along with user attributes to manage the user in Azure AD B2C
61-
| 6. | Microsoft Graph API will in turn create/update/delete the user in Azure AD B2C.
62-
| 7. | Azure AD B2C will send a success/failure response.
63-
| 8. | Microsoft Graph API will then return the response to Saviynt.
64-
65-
## Onboard with Saviynt
66-
67-
1. To create a Saviynt account, contact [Saviynt](https://saviynt.com/contact-us/)
68-
69-
2. Create delegated administration policies and assign users as delegated administrators with various roles.
68+
1. Create a Saviynt account. To get started, go to saviynt.com [Contact Us](https://saviynt.com/contact-us/).
69+
2. Create delegated administration policies.
70+
3. Assign users the delegated administrator role.
7071

7172
## Configure Azure AD B2C with Saviynt
7273

73-
### Create an Azure AD Application for Saviynt
74-
75-
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
76-
1. Make sure you're using the directory that contains your Azure AD B2C tenant. Select the **Directories + subscriptions** icon in the portal toolbar.
77-
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD B2C directory in the **Directory name** list, and then select **Switch**.
78-
1. In the Azure portal, search and select **Azure AD B2C**.
79-
1. Select **App registrations** > **New registration**.
80-
1. Enter a Name for the application. For example, Saviynt and select **Create**.
81-
1. Go to **API Permissions** and select **+ Add a permission.**
82-
1. The Request API permissions page appears. Select **Microsoft APIs** tab and select **Microsoft Graph** as commonly used Microsoft APIs.
83-
1. Go to the next page, and select **Application permissions**.
84-
1. Select **Directory**, and select **Directory.Read.All** and **Directory.ReadWrite.All** checkboxes.
85-
1. Select **Add Permissions**. Review the permissions added.
86-
1. Select **Grant admin consent for Default Directory** > **Save**.
87-
1. Go to **Certificates and Secrets** and select **+ Add Client Secret**. Enter the client secret description, select the expiry option, and select **Add**.
88-
1. The Secret key is generated and displayed in the Client secret section. You'll need to use it later.
89-
90-
1. Go to **Overview** and get the **Client ID** and **Tenant ID**.
91-
1. Tenant ID, client ID, and client secret will be needed to complete the setup in Saviynt.
92-
93-
### Enable Saviynt to Delete users
94-
95-
The below steps explain how to enable Saviynt to perform user delete operations in Azure AD B2C.
74+
Use the following instructions to create an application, delete users, and more.
9675

97-
>[!NOTE]
98-
>[Evaluate the risk before granting admin roles access to a service principal.](../active-directory/develop/app-objects-and-service-principals.md)
76+
### Create an Azure AD application for Saviynt
9977

100-
1. Install the latest version of MSOnline PowerShell Module on a Windows workstation/server.
78+
For the following instructions, use the directory with the Azure AD B2C tenant.
10179

102-
2. Connect to AzureAD PowerShell module and execute the following commands:
80+
1. Sign in to the [Azure portal](https://portal.azure.com/#home).
81+
2. In the portal toolbar, select **Directories + subscriptions**.
82+
3. On the **Portal settings, Directories + subscriptions** page, in the **Directory name** list, find your Azure AD B2C directory.
83+
4. Select **Switch**.
84+
5. In the Azure portal, search and select **Azure AD B2C**.
85+
6. Select **App registrations** > **New registration**.
86+
7. Enter an application name. For example, Saviynt.
87+
8. Select **Create**.
88+
9. Go to **API Permissions**.
89+
10. Select **+ Add a permission.**
90+
11. The Request API permissions page appears.
91+
12. Select **Microsoft APIs** tab.
92+
13. Select **Microsoft Graph** as commonly used Microsoft APIs.
93+
14. Go to the next page.
94+
15. Select **Application permissions**.
95+
16. Select **Directory**.
96+
17. Select the **Directory.Read.All** and **Directory.ReadWrite.All** checkboxes.
97+
18. Select **Add Permissions**.
98+
19. Review the permissions.
99+
20. Select **Grant admin consent for Default Directory**.
100+
21. Select **Save**.
101+
22. Go to **Certificates and Secrets**.
102+
23. Select **+ Add Client Secret**.
103+
24. Enter the client secret description.
104+
25. Select the expiry option.
105+
26. Select **Add**.
106+
27. The Secret Key appears in the Client Secret section. Save the Client Secret to use later.
107+
108+
1. Go to **Overview**.
109+
2. Copy the **Client ID** and **Tenant ID**.
110+
111+
Save the Tenant ID, Client ID, and Client Secret to complete the setup.
112+
113+
### Enable Saviynt to delete users
114+
115+
Enable Saviynt to perform user delete operations in Azure AD B2C.
116+
117+
Learn more: [Application and service principal objects in Azure AD](../active-directory/develop/app-objects-and-service-principals.md)
118+
119+
1. Install the latest version of MSOnline PowerShell Module on a Windows workstation or server.
120+
121+
For more information, see [Azure Active Directory V2 PowerShell Module](https://www.powershellgallery.com/packages/AzureAD/2.0.2.140)
122+
123+
2. Connect to the AzureAD PowerShell module and execute the following commands:
103124

104125
```powershell
105126
Connect-msolservice #Enter Admin credentials of the Azure portal
@@ -109,14 +130,10 @@ Add-MsolRoleMember -RoleName "Company Administrator" -RoleMemberType ServicePrin
109130

110131
## Test the solution
111132

112-
Browse to your Saviynt application tenant and test user life-cycle management and access governance use case.
133+
Browse to your Saviynt application tenant and test user life-cycle management and access governance use cases.
113134

114135
## Next steps
115136

116-
For additional information, review the following articles:
117-
118-
- [Custom policies in Azure AD B2C](./custom-policy-overview.md)
119-
120-
- [Get started with custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
121-
122-
- [Create a web API application](./add-web-api-application.md)
137+
* [Azure AD B2C custom policy overview](./custom-policy-overview.md)
138+
* [Tutorial: Create user flows and custom policies in Azure AD B2C](tutorial-create-user-flows.md?pivots=b2c-custom-policy)
139+
* [Add a web API application to your Azure Active Directory B2C tenant](./add-web-api-application.md)

articles/active-directory-domain-services/concepts-custom-attributes.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Create and manage custom attributes for Azure AD Domain Services | Microsoft Docs
33
description: Learn how to create and manage custom attributes in an Azure AD DS managed domain.
44
services: active-directory-ds
5-
author: justinha
5+
author: AlexCesarini
66
manager: amycolannino
77

88
ms.assetid: 1a14637e-b3d0-4fd9-ba7a-576b8df62ff2
99
ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: how-to
13-
ms.date: 03/06/2023
13+
ms.date: 03/07/2023
1414
ms.author: justinha
1515

1616
---
@@ -44,7 +44,7 @@ After you create a managed domain, click **Custom Attributes (Preview)** under *
4444

4545
## Enable predefined attribute synchronization
4646

47-
Click **OnPremisesExtensionAttributes** to synchronize the attributes extensionAttribute1-15, also known as [Exchange custom attributes](/graph/api/resources/onpremisesextensionattributes?view=graph-rest-1.0).
47+
Click **OnPremisesExtensionAttributes** to synchronize the attributes extensionAttribute1-15, also known as [Exchange custom attributes](/graph/api/resources/onpremisesextensionattributes).
4848

4949
## Synchronize Azure AD directory extension attributes
5050

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 02/28/2023
11+
ms.date: 03/07/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -195,7 +195,7 @@ Use the general guidelines when implementing a SCIM endpoint to ensure compatibi
195195
* Don't require a case-sensitive match on structural elements in SCIM, in particular **PATCH** `op` operation values, as defined in [section 3.5.2](https://tools.ietf.org/html/rfc7644#section-3.5.2). Azure AD emits the values of `op` as **Add**, **Replace**, and **Remove**.
196196
* Microsoft Azure AD makes requests to fetch a random user and group to ensure that the endpoint and the credentials are valid. It's also done as a part of the **Test Connection** flow in the [Azure portal](https://portal.azure.com).
197197
* Support HTTPS on your SCIM endpoint.
198-
* Custom complex and multivalued attributes are supported but Azure AD doesn't have many complex data structures to pull data from in these cases. Simple paired name/value type complex attributes can be mapped to easily, but flowing data to complex attributes with three or more subattributes aren't well supported at this time.
198+
* Custom complex and multivalued attributes are supported but Azure AD doesn't have many complex data structures to pull data from in these cases. Name/value attributes can be mapped to easily, but flowing data to complex attributes with three or more sub-attributes isn't supported.
199199
* The "type" subattribute values of multivalued complex attributes must be unique. For example, there can't be two different email addresses with the "work" subtype.
200200
* The header for all the responses should be of content-Type: application/scim+json
201201

@@ -914,7 +914,7 @@ TLS 1.2 Cipher Suites minimum bar:
914914

915915
### IP Ranges
916916

917-
The Azure AD provisioning service currently operates under the IP Ranges for AzureActiveDirectory as listed [here](https://www.microsoft.com/download/details.aspx?id=56519&WT.mc_id=rss_alldownloads_all). You can add the IP ranges listed under the AzureActiveDirectory tag to allow traffic from the Azure AD provisioning service into your application. You'll need to review the IP range list carefully for computed addresses. An address such as '40.126.25.32' could be represented in the IP range list as '40.126.0.0/18'. You can also programmatically retrieve the IP range list using the following [API](/rest/api/virtualnetwork/servicetags/list).
917+
The Azure AD provisioning service currently operates under the IP Ranges for AzureActiveDirectory as listed [here](https://www.microsoft.com/download/details.aspx?id=56519&WT.mc_id=rss_alldownloads_all). You can add the IP ranges listed under the AzureActiveDirectory tag to allow traffic from the Azure AD provisioning service into your application. You need to review the IP range list carefully for computed addresses. An address such as '40.126.25.32' could be represented in the IP range list as '40.126.0.0/18'. You can also programmatically retrieve the IP range list using the following [API](/rest/api/virtualnetwork/servicetags/list).
918918

919919
Azure AD also supports an agent based solution to provide connectivity to applications in private networks (on-premises, hosted in Azure, hosted in AWS, etc.). Customers can deploy a lightweight agent, which provides connectivity to Azure AD without opening any inbound ports, on a server in their private network. Learn more [here](./on-premises-scim-provisioning.md).
920920

0 commit comments

Comments
 (0)