Skip to content

Commit 59de498

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into alerts-state
2 parents ce71c2c + d694a4e commit 59de498

27 files changed

+296
-124
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,11 @@
105105
"redirect_url": "/azure/active-directory/saas-apps/gainsight-tutorial",
106106
"redirect_document_id": false
107107
},
108+
{
109+
"source_path_from_root": "/articles/active-directory/saas-apps/planview-id-tutorial.md",
110+
"redirect_url": "/azure/active-directory/saas-apps/planview-admin-tutorial",
111+
"redirect_document_id": false
112+
},
108113
{
109114
"source_path_from_root": "/articles/active-directory/saas-apps/postman-provisioning-tutorialy.md",
110115
"redirect_url": "/azure/active-directory/saas-apps/postman-provisioning-tutorial",

articles/active-directory/app-provisioning/on-premises-migrate-microsoft-identity-manager.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 10/20/2022
10+
ms.date: 09/11/2023
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313
ms.collection: M365-identity-device-management
@@ -18,8 +18,6 @@ ms.collection: M365-identity-device-management
1818

1919
You can import into the Azure Active Directory (Azure AD) ECMA Connector Host a configuration for a specific connector from a Forefront Identity Manager Synchronization Service or Microsoft Identity Manager Synchronization Service (MIM Sync) installation. The MIM Sync installation is only used for configuration, not for the ongoing synchronization from Azure AD.
2020

21-
>[!IMPORTANT]
22-
>Currently, only the generic SQL and LDAP connectors are supported for use with the Azure AD ECMA Connector Host.
2321

2422
## Create a connector configuration in MIM Sync
2523
This section is included for illustrative purposes, if you wish to set up MIM Sync with a connector. If you already have MIM Sync with your ECMA connector configured, skip to the next section.

articles/active-directory/architecture/automate-provisioning-to-applications-solutions.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -91,15 +91,24 @@ In addition to the pre-integrated gallery applications, Azure AD supports provis
9191

9292
[Learn more about provisioning to SCIM enabled applications](../app-provisioning/use-scim-to-provision-users-and-groups.md)
9393

94-
### Automate provisioning to SQL and LDAP based applications
94+
### Automate provisioning to on-premises applications
9595

96-
Many applications don't support the SCIM standard, and customers have historically used connectors developed for MIM to connect to them. The Azure AD provisioning service supports reusing connectors developed for MIM and provisioning users into applications that rely on an LDAP user store or a SQL database.
96+
Many applications don't support the SCIM standard, and customers have historically used connectors developed for MIM to connect to them. The Azure AD provisioning service supports reusing connectors built for MIM, without needing a MIM sync deployment. This opens up connectivity to a wide range of on-premises and SaaS applications.
97+
98+
|Protocol |Connector|
99+
|-----|-----|
100+
| LDAP | [LDAP](../app-provisioning/on-premises-ldap-connector-configure.md)|
101+
| SQL | [SQL](../app-provisioning/tutorial-ecma-sql-connector.md) |
102+
| REST | [Web Services](../app-provisioning/on-premises-web-services-connector.md)|
103+
| SOAP | [Web Services](../app-provisioning/on-premises-web-services-connector.md)|
104+
| Flat-file| [PowerShell](../app-provisioning/on-premises-powershell-connector.md) |
105+
| Custom | [Custom ECMA connectors](../app-provisioning/on-premises-custom-connector.md) |
97106

98107
[Learn more about on-premises application provisioning](../app-provisioning/user-provisioning.md)
99108

100109
### Use integrations developed by partners
101110

102-
Many applications may not yet support SCIM or rely on SQL / LDAP databases. Microsoft partners have developed SCIM gateways that allow you to synchronize users between Azure AD and various systems such as mainframes, HR systems, and legacy databases. In the image below, the SCIM Gateways are built and managed by partners.
111+
Microsoft partners have developed SCIM gateways that allow you to synchronize users between Azure AD and various systems such as mainframes, HR systems, and legacy databases. In the image below, the SCIM Gateways are built and managed by partners.
103112

104113
![Agent with SCIM gateway](media/automate-user-provisioning-to-applications-solutions/provisioning-agent-with-scim-gateway.png)
105114

articles/active-directory/external-identities/customers/how-to-google-federation-customers.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,8 +87,10 @@ To configure Google federation by using PowerShell, follow these steps:
8787
At this point, the Google identity provider has been set up in your Azure AD, but it's not yet available in any of the sign-in pages. To add the Google identity provider to a user flow:
8888

8989
1. In your customer tenant, browse to **Identity** > **External Identities** > **User flows**.
90-
1. Select the user flow where you want to add the Facebook identity provider.
91-
1. Under Settings, select **Identity providers**
90+
1. Select the user flow where you want to add the Google identity provider.
91+
92+
1. Under Settings, select **Identity providers.**
93+
9294
1. Under **Other Identity Providers**, select **Google**.
9395

9496
<!-- ![Screenshot that shows how to add Google identity provider a user flow.](./media/sign-in-with-google/add-google-idp-to-user-flow.png)-->
@@ -99,3 +101,5 @@ At this point, the Google identity provider has been set up in your Azure AD, bu
99101

100102
- [Add Facebook as an identity provider](how-to-facebook-federation-customers.md)
101103
- [Customize the branding for customer sign-in experiences](how-to-customize-branding-customers.md)
104+
105+

articles/active-directory/manage-apps/cloudflare-conditional-access-policies.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Learn more: [What is Conditional Access?](../conditional-access/overview.md)
2626
* If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
2727
* An Azure AD tenant linked to the Azure AD subscription
2828
* See, [Quickstart: Create a new tenant in Azure AD](../fundamentals/create-new-tenant.md)
29-
* Global Administrator permissions
29+
* One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
3030
* Configured users in the Azure AD subscription
3131
* A Cloudflare account
3232
* Go to dash.cloudflare.com to [Get started with Cloudflare](https://dash.cloudflare.com/sign-up?https%3A%2F%2Fone.dash.cloudflare.com%2F)
@@ -48,16 +48,15 @@ Go to developers.cloudflare.com to [set up Azure AD as an IdP](https://developer
4848

4949
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
5050

51-
1. Sign in to the [Azure portal](https://portal.azure.com).
52-
2. Select **Azure Active Directory**.
53-
3. Under **Manage**, select **App registrations**.
54-
4. Select the application you created.
55-
5. Go to **Branding & properties**.
56-
6. For **Home page URL**, enter the application hostname.
51+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
52+
2. Browse to **Identity** > **Applications** > **App registrations** > **All applications**
53+
3. Select the application you created.
54+
4. Go to **Branding & properties**.
55+
5. For **Home page URL**, enter the application hostname.
5756

5857
![Screenshot of options and entries for branding and properties.](./media/cloudflare-conditional-access-policies/branding-properties.png)
5958

60-
7. Under **Manage**, select **Enterprise applications**.
59+
7. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
6160
8. Select your application.
6261
9. Select **Properties**.
6362
10. For **Visible to users**, select **Yes**. This action enables the app to appear in App Launcher and in [My Apps](https://myapplications.microsoft.com/).

articles/active-directory/manage-apps/datawiza-sso-oracle-peoplesoft.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -152,10 +152,10 @@ To provide more security for sign-ins, you can enforce Azure AD Multi-Factor Aut
152152

153153
Learn more: [Tutorial: Secure user sign-in events with Azure AD MFA](../authentication/tutorial-enable-azure-mfa.md)
154154

155-
1. Sign in to the [Azure portal](https://portal.azure.com) as a Global Administrator.
156-
2. Select **Azure Active Directory** > **Manage** > **Properties**.
157-
3. Under **Properties**, select **Manage security defaults**.
158-
4. Under **Enable Security defaults**, select **Yes**
155+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator).
156+
2. Browse to **Identity** > **Overview** > **Properties** tab.
157+
3. Under **Security defaults**, select **Manage security defaults**.
158+
4. On the **Security defaults** pane, toggle the dropdown menu to select **Enabled**.
159159
5. Select **Save**.
160160

161161
## Enable SSO in the Oracle PeopleSoft console

articles/active-directory/manage-apps/f5-big-ip-kerberos-easy-button.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Integrating a BIG-IP with Azure Active Directory (Azure AD) provides many benefi
2323
* Improved governance: See, [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/) and learn more about Azure AD pre-authentication.
2424
* Enforce organizational policies. See [What is Conditional Access?](../conditional-access/overview.md).
2525
* Full SSO between Azure AD and BIG-IP published services
26-
* Manage identities and access from a single control plane, the [Azure portal](https://portal.azure.com)
26+
* Manage identities and access from a single control plane, the [Microsoft Entra admin center](https://entra.microsoft.com).
2727

2828
To learn more about benefits, see the article on [F5 BIG-IP and Azure AD integration](./f5-integration.md).
2929

@@ -71,7 +71,7 @@ Prior BIG-IP experience isn't necessary, but you need:
7171
* F5 BIG-IP APM add-on license on a BIG-IP F5 BIG-IP&reg; Local Traffic Manager&trade; (LTM)
7272
* 90-day BIG-IP [Free Trial](https://www.f5.com/trial/big-ip-trial.php) license
7373
* User identities [synchronized](../hybrid/connect/how-to-connect-sync-whatis.md) from an on-premises directory to Azure AD, or created in Azure AD and flowed back to your on-premises directory
74-
* An account with Azure AD Application Admin [permissions](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator)
74+
* One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
7575
* An [SSL Web certificate](./f5-bigip-deployment-guide.md) for publishing services over HTTPS, or use the default BIG-IP certificates while testing
7676
* A Kerberos application, or go to active-directory-wp.com to learn to configure [SSO with IIS on Windows](https://active-directory-wp.com/docs/Networking/Single_Sign_On/SSO_with_IIS_on_Windows.html).
7777

@@ -88,13 +88,12 @@ This tutorial covers the latest Guided Configuration 16.1 with an Easy Button te
8888

8989
Before a client or service can access Microsoft Graph, it must be trusted by the [Microsoft identity platform.](../develop/quickstart-register-app.md). This action creates a tenant app registration to authorize Easy Button access to Graph. Through these permissions, the BIG-IP pushes the configurations to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
9090

91-
1. Sign in to the [Azure portal](https://portal.azure.com) using an account with Application Admin permissions.
92-
2. From the left navigation pane, select the **Azure Active Directory** service.
93-
3. Under Manage, select **App registrations > New registration**.
94-
4. Enter a display name for your application. For example, F5 BIG-IP Easy Button.
95-
5. Specify who can use the application > **Accounts in this organizational directory only**.
96-
6. Select **Register**.
97-
7. Navigate to **API permissions** and authorize the following Microsoft Graph **Application permissions**:
91+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
92+
2. Browse to **Identity** > **Applications** > **App registrations > New registration**.
93+
3. Enter a display name for your application. For example, F5 BIG-IP Easy Button.
94+
4. Specify who can use the application > **Accounts in this organizational directory only**.
95+
5. Select **Register**.
96+
6. Navigate to **API permissions** and authorize the following Microsoft Graph **Application permissions**:
9897

9998
* Application.Read.All
10099
* Application.ReadWrite.All

articles/active-directory/manage-apps/f5-big-ip-oracle-peoplesoft-easy-button.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Integrate BIG-IP with Azure AD for many benefits:
2424
* See, [Zero Trust framework to enable remote work](https://www.microsoft.com/security/blog/2020/04/02/announcing-microsoft-zero-trust-assessment-tool/)
2525
* See, [What is Conditional Access?](../conditional-access/overview.md)
2626
* Single sign-on (SSO) between Azure AD and BIG-IP published services
27-
* Manage identities and access from the [Azure portal](https://portal.azure.com)
27+
* Manage identities and access from the [Microsoft Entra admin center](https://entra.microsoft.com)
2828

2929
Learn more:
3030

@@ -75,8 +75,7 @@ For this scenario, SHA supports SP- and IdP-initiated flows. The following diagr
7575
* 90-day BIG-IP full feature [trial license](https://www.f5.com/trial/big-ip-trial.php)
7676
* User identities synchronized from an on-premises directory to Azure AD, or created in Azure AD and flowed back to the on-premises directory
7777
* See, [Azure AD Connect sync: Understand and customize synchronization](../hybrid/connect/how-to-connect-sync-whatis.md)
78-
* An account with Azure AD Application Admin permissions
79-
* See, [Azure AD built-in roles](../roles/permissions-reference.md)
78+
* One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
8079
* An SSL Web certificate to publish services over HTTPS, or use default BIG-IP certs for testing
8180
* See, [Deploy F5 BIG-IP Virtual Edition VM in Azure](./f5-bigip-deployment-guide.md)
8281
* A PeopleSoft environment
@@ -100,14 +99,13 @@ Learn more: [Quickstart: Register an application with the Microsoft identity pla
10099

101100
The following instructions help you create a tenant app registration to authorize Easy Button access to Graph. With these permissions, the BIG-IP pushes the configurations to establish a trust between a SAML SP instance for published application, and Azure AD as the SAML IdP.
102101

103-
1. Sign in to the [Azure portal](https://portal.azure.com) with Application Administrative permissions.
104-
2. From the left navigation pane, select the **Azure Active Directory** service.
105-
3. Under **Manage**, select **App registrations > New registration**.
106-
4. Enter an application **Name**.
107-
5. For **Accounts in this organizational directory only**, specify who uses the application.
108-
6. Select **Register**.
109-
7. Navigate to **API permissions**.
110-
8. Authorize the following Microsoft Graph **Application permissions**:
102+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
103+
2. Browse to **Identity** > **Applications** > **App registrations > New registration**.
104+
3. Enter an application **Name**.
105+
4. For **Accounts in this organizational directory only**, specify who uses the application.
106+
5. Select **Register**.
107+
6. Navigate to **API permissions**.
108+
7. Authorize the following Microsoft Graph **Application permissions**:
111109

112110
* Application.ReadWrite.All
113111
* Application.ReadWrite.OwnedBy

articles/active-directory/manage-apps/f5-passwordless-vpn.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Enabling a BIG-IP SSL-VPN for Azure AD single sign-on (SSO) provides many benefi
2424
- Improved Zero trust governance through Azure AD pre-authentication and Conditional Access.
2525
- [What is Conditional Access?](../conditional-access/overview.md)
2626
- [Passwordless authentication](https://www.microsoft.com/security/business/identity/passwordless) to the VPN service
27-
- Manage identities and access from a single control plane, the [Azure portal](https://azure.microsoft.com/features/azure-portal/)
27+
- Manage identities and access from a single control plane, the [Microsoft Entra admin center](https://entra.microsoft.com)
2828

2929
To learn about more benefits, see
3030

@@ -50,31 +50,28 @@ Prior experience or knowledge of F5 BIG-IP isn't necessary, however, you'll need
5050
- An Azure AD subscription
5151
- If you don't have one, you can get an [Azure free account](https://azure.microsoft.com/trial/get-started-active-directory/) or above
5252
- User identities [synchronized from their on-premises directory](../hybrid/connect/how-to-connect-sync-whatis.md) to Azure AD.
53-
- An account with Azure AD application admin [permissions](../roles/permissions-reference.md#application-administrator)
53+
- One of the following roles: Global Administrator, Cloud Application Administrator, or Application Administrator.
5454
- BIG-IP infrastructure with client traffic routing to and from the BIG-IP
5555
- Or [deploy a BIG-IP Virtual Edition into Azure](f5-bigip-deployment-guide.md)
5656
- A record for the BIG-IP published VPN service in public DNS
5757
- Or a test client localhost file while testing
5858
- The BIG-IP provisioned with the needed SSL certificates for publishing services over HTTPS
5959

6060
To improve the tutorial experience, you can learn industry-standard terminology on the F5 BIG-IP [Glossary](https://www.f5.com/services/resources/glossary).
61-
62-
>[!NOTE]
63-
>Some instructions might vary slightly from the Azure portal.
61+
6462

6563
## Add F5 BIG-IP from the Azure AD gallery
6664

6765
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
6866

6967
Set up a SAML federation trust between the BIG-IP to allow the Azure AD BIG-IP to hand off the pre-authentication and [Conditional Access](../conditional-access/overview.md) to Azure AD, before it grants access to the published VPN service.
7068

71-
1. Sign in to the [Azure portal](https://portal.azure.com) with application admin rights.
72-
2. From the left navigation pane, select the **Azure Active Directory service**.
73-
3. Go to **Enterprise Applications** and from the top ribbon select **New application**.
74-
4. In the gallery, search for F5 and select **F5 BIG-IP APM Azure AD integration**.
75-
5. Enter a name for the application.
76-
6. Select **Add** then **Create**.
77-
7. The name, as an icon, appears in the Azure portal and Office 365 portal.
69+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
70+
2. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**, then select **New application**.
71+
3. In the gallery, search for F5 and select **F5 BIG-IP APM Azure AD integration**.
72+
4. Enter a name for the application.
73+
5. Select **Add** then **Create**.
74+
6. The name, as an icon, appears in the Microsoft Entra admin center and Office 365 portal.
7875

7976
## Configure Azure AD SSO
8077

0 commit comments

Comments
 (0)