Skip to content

Commit 5477917

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 07572be + 991268c commit 5477917

File tree

119 files changed

+2307
-516
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

119 files changed

+2307
-516
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25946,6 +25946,11 @@
2594625946
"redirect_url": "/azure/sendgrid-dotnet-how-to-send-email",
2594725947
"redirect_document_id": false
2594825948
},
25949+
{
25950+
"source_path_from_root": "/articles/sentinel/automate-playbook-watchlist.md",
25951+
"redirect_url": "https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/playbooks-amp-watchlists-part-1-inform-the-subscription-owner/ba-p/1768917",
25952+
"redirect_document_id": false
25953+
},
2594925954
{
2595025955
"source_path_from_root": "/articles/sentinel/connect-microsoft-waf.md",
2595125956
"redirect_url": "/azure/sentinel/connect-azure-waf",
Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: How the Microsoft identity platform uses the SAML protocol
3-
description: This article provides an overview of the Single Sign-On and Single Sign-Out SAML profiles in Azure Active Directory.
3+
description: This article provides an overview of the single sign-on and Single Sign-Out SAML profiles in Azure Active Directory.
44
services: active-directory
55
author: kenwith
66
manager: CelesteDG
@@ -9,27 +9,29 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 10/05/2018
12+
ms.date: 10/27/2021
1313
ms.author: kenwith
1414
ms.custom: aaddev
1515
ms.reviewer: paulgarn
1616
---
1717

1818
# How the Microsoft identity platform uses the SAML protocol
1919

20-
The Microsoft identity platform uses the SAML 2.0 protocol to enable applications to provide a single sign-on experience to their users. The [Single Sign-On](single-sign-on-saml-protocol.md) and [Single Sign-Out](single-sign-out-saml-protocol.md) SAML profiles of Azure AD explain how SAML assertions, protocols, and bindings are used in the identity provider service.
20+
The Microsoft identity platform uses the SAML 2.0 and other protocols to enable applications to provide a single sign-on (SSO) experience to their users. The [SSO](single-sign-on-saml-protocol.md) and [Single Sign-Out](single-sign-out-saml-protocol.md) SAML profiles of Azure Active Directory (Azure AD) explain how SAML assertions, protocols, and bindings are used in the identity provider service.
2121

22-
SAML Protocol requires the identity provider (Microsoft identity platform) and the service provider (the application) to exchange information about themselves.
22+
The SAML protocol requires the identity provider (Microsoft identity platform) and the service provider (the application) to exchange information about themselves.
2323

2424
When an application is registered with Azure AD, the app developer registers federation-related information with Azure AD. This information includes the **Redirect URI** and **Metadata URI** of the application.
2525

26-
The Microsoft identity platform uses the cloud service's **Metadata URI** to retrieve the signing key and the logout URI. Customer can open the app in **Azure AD -> App Registration** and then in **Settings -> Properties**, they can update the Logout URL. This way the Microsoft identity platform can send the response to the correct URL.
26+
The Microsoft identity platform uses the cloud service's **Metadata URI** to retrieve the signing key and the logout URI. In the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>, you can open the app in **Azure Active Directory -> App registrations**, and then in **Manage -> Authentication**, you can update the Logout URL. This way the Microsoft identity platform can send the response to the correct URL.
2727

28-
Azure Active Directory exposes tenant-specific and common (tenant-independent) single sign-on and single sign-out endpoints. These URLs represent addressable locations -- they are not just identifiers -- so you can go to the endpoint to read the metadata.
28+
Azure AD exposes tenant-specific and common (tenant-independent) SSO and single sign-out endpoints. These URLs represent addressable locations--they're not just identifiers--so you can go to the endpoint to read the metadata.
2929

30-
* The tenant-specific endpoint is located at `https://login.microsoftonline.com/<TenantDomainName>/FederationMetadata/2007-06/FederationMetadata.xml`. The *\<TenantDomainName>* placeholder represents a registered domain name or TenantID GUID of an Azure AD tenant. For example, the federation metadata of the contoso.com tenant is at: https://login.microsoftonline.com/contoso.com/FederationMetadata/2007-06/FederationMetadata.xml
30+
- The tenant-specific endpoint is located at `https://login.microsoftonline.com/<TenantDomainName>/FederationMetadata/2007-06/FederationMetadata.xml`. The _\<TenantDomainName>_ placeholder represents a registered domain name or TenantID GUID of an Azure AD tenant. For example, the federation metadata of the contoso.com tenant is at: https://login.microsoftonline.com/contoso.com/FederationMetadata/2007-06/FederationMetadata.xml
3131

32-
* The tenant-independent endpoint is located at
32+
- The tenant-independent endpoint is located at
3333
`https://login.microsoftonline.com/common/FederationMetadata/2007-06/FederationMetadata.xml`. In this endpoint address, **common** appears instead of a tenant domain name or ID.
3434

35+
## Next steps
36+
3537
For information about the federation metadata documents that Azure AD publishes, see [Federation Metadata](../azuread-dev/azure-ad-federation-metadata.md).

articles/active-directory/develop/consent-framework.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ The following steps show you how the consent experience works for both the appli
5656
![Grant permissions for explicit admin consent](./media/consent-framework/grant-consent.png)
5757

5858
> [!IMPORTANT]
59-
> Granting explicit consent using the **Grant permissions** button is currently required for single-page applications (SPA) that use ADAL.js. Otherwise, the application fails when the access token is requested.
59+
> Granting explicit consent using the **Grant permissions** button is currently required for single-page applications (SPA) that use MSAL.js. Otherwise, the application fails when the access token is requested.
6060
6161
## Next steps
6262

articles/active-directory/hybrid/how-to-connect-install-express.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.workload: identity
1111
ms.tgt_pltfrm: na
1212
ms.devlang: na
1313
ms.topic: how-to
14-
ms.date: 09/28/2018
14+
ms.date: 11/29/2021
1515
ms.subservice: hybrid
1616
ms.author: billmath
1717

@@ -25,7 +25,6 @@ Before you start installing Azure AD Connect, make sure to [download Azure AD Co
2525
If express settings does not match your topology, see [related documentation](#related-documentation) for other scenarios.
2626

2727
## Express installation of Azure AD Connect
28-
You can see these steps in action in the [videos](#videos) section.
2928

3029
1. Sign in as a local administrator to the server you wish to install Azure AD Connect on. You should do this on the server you wish to be the sync server.
3130
2. Navigate to and double-click **AzureADConnect.msi**.
@@ -48,12 +47,6 @@ You can see these steps in action in the [videos](#videos) section.
4847
9. When the installation completes, click **Exit**.
4948
10. After the installation has completed, sign off and sign in again before you use Synchronization Service Manager or Synchronization Rule Editor.
5049

51-
## Videos
52-
For a video on using the express installation, see:
53-
54-
> [!VIDEO https://channel9.msdn.com/Series/Azure-Active-Directory-Videos-Demos/Azure-Active-Directory-Connect-Express-Settings/player]
55-
>
56-
>
5750

5851
## Next steps
5952
Now that you have Azure AD Connect installed you can [verify the installation and assign licenses](how-to-connect-post-installation.md).

articles/active-directory/hybrid/tshoot-connect-connectivity.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: troubleshooting
16-
ms.date: 04/25/2019
16+
ms.date: 11/18/2021
1717
ms.subservice: hybrid
1818
ms.author: billmath
1919

@@ -24,7 +24,10 @@ ms.custom: has-adal-ref
2424
This article explains how connectivity between Azure AD Connect and Azure AD works and how to troubleshoot connectivity issues. These issues are most likely to be seen in an environment with a proxy server.
2525

2626
## Troubleshoot connectivity issues in the installation wizard
27-
Azure AD Connect is using Modern Authentication (using the ADAL library) for authentication. The installation wizard and the sync engine proper require machine.config to be properly configured since these two are .NET applications.
27+
Azure AD Connect uses the MSAL library for authentication. The installation wizard and the sync engine proper require machine.config to be properly configured since these two are .NET applications.
28+
29+
>[!NOTE]
30+
>Azure AD Connect v1.6.xx.x uses the ADAL library. The ADAL library is being depricated and support will end in June 2022. Microsot recommendeds that you upgrade to the latest version of [Azure AD Connect v2](whatis-azure-ad-connect-v2.md).
2831
2932
In this article, we show how Fabrikam connects to Azure AD through its proxy. The proxy server is named fabrikamproxy and is using port 8080.
3033

articles/api-management/api-management-howto-ip-addresses.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,11 @@ ms.custom: fasttrack-edit
1414

1515
# IP addresses of Azure API Management
1616

17-
In this article we describe how to retrieve the IP addresses of Azure API Management service. IP addresses can be public or private if the service is in a virtual network.
18-
19-
You can use IP addresses to create firewall rules, filter the incoming traffic to the backend services, or restrict the outbound traffic.
17+
In this article we describe how to retrieve the IP addresses of Azure API Management service. IP addresses can be public or private if the service is in a virtual network. You can use IP addresses to create firewall rules, filter the incoming traffic to the backend services, or restrict the outbound traffic.
2018

2119
## IP addresses of API Management service
2220

23-
Every API Management service instance in Developer, Basic, Standard, or Premium tier has public IP addresses, which are exclusive only to that service instance (they are not shared with other resources).
21+
Every API Management service instance in Developer, Basic, Standard, or Premium tier has public IP addresses, which are exclusive only to that service instance (they are not shared with other resources).
2422

2523
You can retrieve the IP addresses from the overview dashboard of your resource in the Azure portal.
2624

@@ -54,7 +52,7 @@ In [multi-regional deployments](api-management-howto-deploy-multi-region.md), ea
5452

5553
If your API Management service is inside a virtual network, it will have two types of IP addresses - public and private.
5654

57-
Public IP addresses are used for internal communication on port `3443` - for managing configuration (for example, through Azure Resource Manager). In the external VNet configuration, they are also used for runtime API traffic.
55+
Public IP addresses are used for internal communication on port `3443` - for managing configuration (for example, through Azure Resource Manager). In the external VNet configuration, they are also used for runtime API traffic.
5856

5957
Private virtual IP (VIP) addresses, available **only** in the [internal VNet mode](api-management-using-with-internal-vnet.md), are used to connect from within the network to API Management endpoints - gateways, the developer portal, and the management plane for direct API access. You can use them for setting up DNS records within the network.
6058

@@ -82,15 +80,15 @@ GET https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/
8280
}
8381
```
8482

85-
API Management uses a public IP address for connections outside the VNet and a private IP address for connections within the VNet.
83+
API Management uses a public IP address for connections outside the VNet and a private IP address for connections within the VNet.
8684

87-
When API management is deployed in the [internal VNet configuration](api-management-using-with-internal-vnet.md) and API management connects to private (intranet-facing) backends, internal IP addresses from the subnet are used for the runtime API traffic. When a request is sent from API Management to a private backend, a private IP address will be visible as the origin of the request. Therefore in this configuration, if a requirement exists to restrict traffic between API Management and an internal backend, it is better to use the whole API Management subnet prefix with an IP rule and not just the private IP address associated with the API Management resource.
85+
When API management is deployed in the [internal VNet configuration](api-management-using-with-internal-vnet.md) and API management connects to private (intranet-facing) backends, internal IP addresses from the subnet are used for the runtime API traffic. When a request is sent from API Management to a private backend, a private IP address will be visible as the origin of the request. Therefore in this configuration, if a requirement exists to restrict traffic between API Management and an internal backend, it is better to use the whole API Management subnet prefix with an IP rule and not just the private IP address associated with the API Management resource.
8886

8987
When a request is sent from API Management to a public-facing (internet-facing) backend, a public IP address will always be visible as the origin of the request.
9088

9189
## IP addresses of Consumption tier API Management service
9290

93-
If your API Management service is a Consumption tier service, it doesn't have a dedicated IP address. Consumption tier service runs on a shared infrastructure and without a deterministic IP address.
91+
If your API Management service is a Consumption tier service, it doesn't have a dedicated IP address. Consumption tier service runs on a shared infrastructure and without a deterministic IP address.
9492

9593
For traffic restriction purposes, you can use the range of IP addresses of Azure data centers. Refer to [the Azure Functions documentation article](../azure-functions/ip-addresses.md#data-center-outbound-ip-addresses) for precise steps.
9694

@@ -102,5 +100,6 @@ In the Developer, Basic, Standard, and Premium tiers of API Management, the publ
102100
* The service subscription is [suspended](https://github.com/Azure/azure-resource-manager-rpc/blob/master/v1.0/subscription-lifecycle-api-reference.md#subscription-states) or [warned](https://github.com/Azure/azure-resource-manager-rpc/blob/master/v1.0/subscription-lifecycle-api-reference.md#subscription-states) (for example, for nonpayment) and then reinstated.
103101
* Azure Virtual Network is added to or removed from the service.
104102
* API Management service is switched between External and Internal VNet deployment mode.
103+
* [Availability zones](zone-redundancy.md) are enabled, added, or removed.
105104

106-
In [multi-regional deployments](api-management-howto-deploy-multi-region.md), the regional IP address changes if a region is vacated and then reinstated. The regional IP address also changes when you enable, add, or remove [availability zones](zone-redundancy.md).
105+
In [multi-regional deployments](api-management-howto-deploy-multi-region.md), the regional IP address changes if a region is vacated and then reinstated.

0 commit comments

Comments
 (0)