Skip to content

Commit 591ffa4

Browse files
authored
Merge pull request #178918 from MicrosoftDocs/master
11/05 PM Publish
2 parents 1a0fe16 + 57d2ea4 commit 591ffa4

File tree

98 files changed

+1574
-323
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

98 files changed

+1574
-323
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -957,7 +957,7 @@
957957
},
958958
{
959959
"source_path_from_root": "/articles/active-directory/active-directory-saas-facebook-at-work-provisioning-tutorial.md",
960-
"redirect_url": "/azure/active-directory/active-directory-saas-workplacebyfacebook-provisioning-tutorial",
960+
"redirect_url": "/azure/active-directory/saas-apps/workplace-by-facebook-provisioning-tutorial",
961961
"redirect_document_id": false
962962
},
963963
{
@@ -9887,7 +9887,7 @@
98879887
},
98889888
{
98899889
"source_path_from_root": "/articles/active-directory/active-directory-saas-workplacebyfacebook-provisioning-tutorial.md",
9890-
"redirect_url": "/azure/active-directory/saas-apps/workplacebyfacebook-provisioning-tutorial",
9890+
"redirect_url": "/azure/active-directory/saas-apps/workplace-by-facebook-provisioning-tutorial",
98919891
"redirect_document_id": true
98929892
},
98939893
{
@@ -10546,4 +10546,4 @@
1054610546
"redirect_document_id": false
1054710547
}
1054810548
]
10549-
}
10549+
}

articles/active-directory/conditional-access/concept-conditional-access-session.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -73,10 +73,10 @@ For more information, see the article [Configure authentication session manageme
7373

7474
[Continuous access evaluation](concept-continuous-access-evaluation.md) is auto enabled as part of an organization's Conditional Access policies. For organizations who wish to disable or strictly enforce continuous access evaluation, this configuration is now an option within the session control within Conditional Access. Continuous access evaluation policies can be scoped to all users or specific users and groups. Admins can make the following selections while creating a new policy or while editing an existing Conditional Access policy.
7575

76-
- **Disable** is accomplished when **All cloud apps** are selected, no conditions are selected, and **Disable** is selected under **Session** > **Customize continuous access evaluation** in a Conditional Access policy.
77-
- **Strict enforcement** means that any critical event and policy will be enforced in real time. All CAE-capable services always get CAE tokens, whatever the client or user might ask for or do. There are two scenarios where CAE won't come into play when strict enforcement mode is turned on:
78-
- Non-CAE capable clients shouldn't get a regular token for CAE-capable services.
79-
- Reject when IP seen by resource provider isn't in the allowed range.
76+
- **Disable** only work when **All cloud apps** are selected, no conditions are selected, and **Disable** is selected under **Session** > **Customize continuous access evaluation** in a Conditional Access policy. You can choose to disable all users or specific users and groups.
77+
- **Strict enforcement** can be used to further strengthen the security benefits from CAE. It will make sure that any critical event and policy will be enforced in real time. There are two additional scenarios where CAE will enforce when strict enforcement mode is turned on:
78+
- Non-CAE capable clients will not be allowed to access CAE-capable services.
79+
- Access will be rejected when client's IP address seen by resource provider isn't in the Conditional Access's allowed range.
8080

8181
> [!NOTE]
8282
> You should only enable strict enforcement after you ensure that all the client applications support CAE and you have included all your IP addresses seen by Azure AD and the resource providers, like Exchange online and Azure Resource Mananger, in your location policy under Conditional Access. Otherwise, users in your tenants could be blocked.

articles/active-directory/devices/hybrid-azuread-join-managed-domains.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ Hybrid Azure AD join requires devices to have access to the following Microsoft
7373
- `https://autologon.microsoftazuread-sso.com` (If you use or plan to use seamless SSO)
7474

7575
> [!WARNING]
76-
> If your organization uses proxy servers that intercept SSL traffic for scenarios like data loss prevention or Azure AD tenant restrictions, ensure that traffic to `https://device.login.microsoftonline.com` and `https://enterpriseregistration.windows.net`is excluded from TLS break-and-inspect. Failure to exclude these URLs may cause interference with client certificate authentication, cause issues with device registration, and device-based Conditional Access.
76+
> If your organization uses proxy servers that intercept SSL traffic for scenarios like data loss prevention or Azure AD tenant restrictions, ensure that traffic to these URLs are excluded from TLS break-and-inspect. Failure to exclude these URLs may cause interference with client certificate authentication, cause issues with device registration, and device-based Conditional Access.
7777
7878
If your organization requires access to the internet via an outbound proxy, you can use [implementing Web Proxy Auto-Discovery (WPAD)](/previous-versions/tn-archive/cc995261(v=technet.10)) to enable Windows 10 computers for device registration with Azure AD. To address issues configuring and managing WPAD, see [Troubleshooting Automatic Detection](/previous-versions/tn-archive/cc302643(v=technet.10)). In Windows 10 devices prior to 1709 update, WPAD is the only available option to configure a proxy to work with Hybrid Azure AD join.
7979

@@ -224,4 +224,4 @@ If you experience issues completing hybrid Azure AD join for domain-joined Windo
224224

225225
Advance to the next article to learn how to manage device identities by using the Azure portal.
226226
> [!div class="nextstepaction"]
227-
> [Manage device identities](device-management-azure-portal.md)
227+
> [Manage device identities](device-management-azure-portal.md)

articles/active-directory/external-identities/hybrid-cloud-to-on-premises.md

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: how-to
9-
ms.date: 10/30/2020
9+
ms.date: 11/05/2021
1010

1111
ms.author: mimart
1212
author: msmimart
@@ -44,10 +44,10 @@ To provide B2B users access to on-premises applications that are secured with in
4444
> [!NOTE]
4545
> When you configure the Azure AD Application Proxy, ensure that **Delegated Logon Identity** is set to **User principal name** (default) in the single sign-on configuration for integrated Windows authentication (IWA).
4646
47-
For the B2B user scenario, there are two methods available that you can use to create the guest user objects that are required for authorization in the on-premises directory:
47+
For the B2B user scenario, there are two methods you can use to create the guest user objects that are required for authorization in the on-premises directory:
4848

49-
- Microsoft Identity Manager (MIM) and the MIM management agent for Microsoft Graph.
50-
- [A PowerShell script](#create-b2b-guest-user-objects-through-a-script-preview). Using the script is a more lightweight solution that does not require MIM.
49+
- Microsoft Identity Manager (MIM) and the MIM management agent for Microsoft Graph.
50+
- A PowerShell script, which is a more lightweight solution that does not require MIM.
5151

5252
The following diagram provides a high-level overview of how Azure AD Application Proxy and the generation of the B2B user object in the on-premises directory work together to grant B2B users access to your on-premises IWA and KCD apps. The numbered steps are described in detail below the diagram.
5353

@@ -72,20 +72,12 @@ You can manage the on-premises B2B user objects through lifecycle management pol
7272

7373
For information about how to use MIM 2016 Service Pack 1 and the MIM management agent for Microsoft Graph to create the guest user objects in the on-premises directory, see [Azure AD business-to-business (B2B) collaboration with Microsoft Identity Manager (MIM) 2016 SP1 with Azure Application Proxy](/microsoft-identity-manager/microsoft-identity-manager-2016-graph-b2b-scenario).
7474

75-
### Create B2B guest user objects through a script (Preview)
76-
77-
There’s a PowerShell sample script available that you can use as a starting point to create the guest user objects in your on-premises Active Directory.
78-
79-
You can download the script and the Readme file from [Connectors for Microsoft Identity Manager 2016 and Forefront Identity Manager 2010 R2](https://www.microsoft.com/download/details.aspx?id=51495). In the download package, choose the **Script and Readme to pull Azure AD B2B users on-prem.zip** file.
80-
81-
Before you use the script, make sure that you review the prerequisites and important considerations in the associated Readme file. Also, understand that the script is made available only as a sample. Your development team or a partner must customize and review the script before you run it.
82-
8375
## License considerations
8476

8577
Make sure that you have the correct Client Access Licenses (CALs) for external guest users who access on-premises apps. For more information, see the "External Connectors" section of [Client Access Licenses and Management Licenses](https://www.microsoft.com/licensing/product-licensing/client-access-license.aspx). Consult your Microsoft representative or local reseller regarding your specific licensing needs.
8678

8779
## Next steps
8880

89-
- [Azure Active Directory B2B collaboration for hybrid organizations](hybrid-organizations.md)
81+
- See also [Azure Active Directory B2B collaboration for hybrid organizations](hybrid-organizations.md)
9082

9183
- For an overview of Azure AD Connect, see [Integrate your on-premises directories with Azure Active Directory](../hybrid/whatis-hybrid-identity.md).

articles/active-directory/external-identities/invite-internal-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Sending an invitation to an existing internal account lets you retain that user
3434
- **On-premises synced users**: For user accounts that are synced between on-premises and the cloud, the on-premises directory remains the source of authority after they’re invited to use B2B collaboration. Any changes you make to the on-premises account will sync to the cloud account, including disabling or deleting the account. Therefore, you can’t prevent the user from signing into their on-premises account while retaining their cloud account by simply deleting the on-premises account. Instead, you can set the on-premises account password to a random GUID or other unknown value.
3535

3636
> [!NOTE]
37-
In Azure AD Connect sync, there’s a default rule that writes the [onPremisesUserPrincipalName attribute](../hybrid/reference-connect-sync-attributes-synchronized.md#notes) to the user object. Because the presence of this attribute can prevent a user from signing in using external credentials, we block internal-to-external conversions for user objects with this attribute. If you’re using Azure AD Connect and you want to be able to invite internal users to B2B collaboration, you'll need to [modify the default rule](../hybrid/how-to-connect-sync-change-the-configuration.md) so the onPremisesUserPrincipalName attribute isn’t written to the user object.
37+
> In Azure AD Connect sync, there’s a default rule that writes the [onPremisesUserPrincipalName attribute](../hybrid/reference-connect-sync-attributes-synchronized.md#notes) to the user object. Because the presence of this attribute can prevent a user from signing in using external credentials, we block internal-to-external conversions for user objects with this attribute. If you’re using Azure AD Connect and you want to be able to invite internal users to B2B collaboration, you'll need to [modify the default rule](../hybrid/how-to-connect-sync-change-the-configuration.md) so the onPremisesUserPrincipalName attribute isn’t written to the user object.
3838
## How to invite internal users to B2B collaboration
3939

4040
You can use PowerShell or the invitation API to send a B2B invitation to the internal user. Make sure the email address you want to use for the invitation is set as the external email address on the internal user object.

0 commit comments

Comments
 (0)