Skip to content

Commit 5b41d1d

Browse files
committed
Merge branch 'main' into release-preview-mswb
2 parents 3d9735d + a11b46f commit 5b41d1d

File tree

322 files changed

+3386
-2247
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

322 files changed

+3386
-2247
lines changed

articles/active-directory/develop/howto-add-app-roles-in-apps.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,17 @@ To create an app role by using the Azure portal's user interface:
6363

6464
When the app role is set to enabled, any users, applications or groups who are assigned has it included in their tokens. These can be access tokens when your app is the API being called by an app or ID tokens when your app is signing in a user. If set to disabled, it becomes inactive and no longer assignable. Any previous assignees will still have the app role included in their tokens, but it has no effect as it is no longer actively assignable.
6565

66+
## Assign application owner
67+
68+
If you have not already done so, you'll need to assign yourself as the application owner.
69+
70+
1. In your app registration, under **Manage**, select **Owners**, and **Add owners**.
71+
1. In the new window, find and select the owner(s) that you want to assign to the application. Selected owners appear in the right panel. Once done, confirm with **Select**. The app owner(s) will now appear in the owner's list.
72+
73+
>[!NOTE]
74+
>
75+
> Ensure that both the API application and the application you want to add permissions to both have an owner, otherwise the API will not be listed when requesting API permissions.
76+
6677
## Assign users and groups to roles
6778

6879
Once you've added app roles in your application, you can assign users and groups to the roles. Assignment of users and groups to roles can be done through the portal's UI, or programmatically using [Microsoft Graph](/graph/api/user-post-approleassignments). When the users assigned to the various app roles sign in to the application, their tokens will have their assigned roles in the `roles` claim.

articles/active-directory/develop/includes/web-app-client-credentials.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,4 +72,8 @@ Instead of a client secret, you can provide a client certificate. The following
7272
}
7373
```
7474

75-
*Microsoft.Identity.Web* provides several ways to describe certificates, both by configuration or by code. For details, see [Microsoft.Identity.Web - Using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Using-certificates) on GitHub.
75+
> [!WARNING]
76+
>
77+
> If you forget to change the `Scopes` to an array, when you try to use the `IDownstreamApi` the scopes will appear null, and `IDownstreamApi` will attempt an anonymous (unauthenticated) call to the downstream API, which will result in a `401/unauthenticated`.
78+
79+
*Microsoft.Identity.Web* provides several ways to describe certificates, both by configuration or by code. For details, see [Microsoft.Identity.Web - Using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Using-certificates) on GitHub.

articles/active-directory/develop/quickstart-configure-app-expose-web-apis.md

Lines changed: 28 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.reviewer: aragra, lenalepa, sureshja
1717

1818
# Quickstart: Configure an application to expose a web API
1919

20-
In this quickstart, you'll register a web API with the Microsoft identity platform and expose it to client apps by adding a scope. By registering your web API and exposing it through scopes, you can provide permissions-based access to its resources to authorized users and client apps that access your API.
20+
In this quickstart, you'll register a web API with the Microsoft identity platform and expose it to client apps by adding a scope. By registering your web API and exposing it through scopes, assigning an owner and app role, you can provide permissions-based access to its resources to authorized users and client apps that access your API.
2121

2222
## Prerequisites
2323

@@ -34,7 +34,30 @@ Perform the steps in the **Register an application** section of [Quickstart: Reg
3434

3535
Skip the **Redirect URI (optional)** section. You don't need to configure a redirect URI for a web API since no user is logged in interactively.
3636

37-
With the web API registered, you can add scopes to the API's code so it can provide granular permission to consumers.
37+
## Assign application owner
38+
39+
1. In your app registration, under **Manage**, select **Owners**, and **Add owners**.
40+
1. In the new window, find and select the owner(s) that you want to assign to the application. Selected owners appear in the right panel. Once done, confirm with **Select**. The app owner(s) will now appear in the owner's list.
41+
42+
>[!NOTE]
43+
>
44+
> Ensure that both the API application and the application you want to add permissions to both have an owner, otherwise the API will not be listed when requesting API permissions.
45+
46+
## Assign app role
47+
48+
1. In your app registration, under **Manage**, select **App roles**, and **Create app role**.
49+
1. Next, specify the app role's attributes in the **Create app role** pane. For this walk-through, you can use the example values or specify your own.
50+
51+
| Field | Description | Example |
52+
|-------|-------------|---------|
53+
| **Display name** | The name of your app role | *Employee Records* |
54+
| **Allowed member types** | Specifies whether the app role can be assigned to users/groups and/or applications | *Applications* |
55+
| **Value** | The value displayed in the "roles" claim of a token | `Employee.Records` |
56+
| **Description** | A more detailed description of the app role | *Applications have access to employee records* |
57+
58+
1. Select the checkbox to enable the app role.
59+
60+
With the web API registered, assigned an app role and owner, you can add scopes to the API's code so it can provide granular permission to consumers.
3861

3962
## Add a scope
4063

@@ -44,9 +67,9 @@ The code in a client application requests permission to perform operations defin
4467

4568
First, follow these steps to create an example scope named `Employees.Read.All`:
4669

47-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
48-
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/quickstart-configure-app-expose-web-apis/portal-01-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant containing your client app's registration.
49-
1. Select **Azure Active Directory** > **App registrations**, and then select your API's app registration.
70+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
71+
1. If you have access to multiple tenants, use the **Directories + subscriptions** filter :::image type="icon" source="./media/quickstart-configure-app-access-web-apis/portal-01-directory-subscription-filter.png" border="false"::: in the top menu to select the tenant containing your client app's registration.
72+
1. Browse to **Identity** > **Applications** > **App registrations**, and then select your API's app registration.
5073
1. Select **Expose an API**
5174
1. Select **Add** next to **Application ID URI** if you haven't yet configured one.
5275

@@ -56,7 +79,6 @@ First, follow these steps to create an example scope named `Employees.Read.All`:
5679
:::image type="content" source="media/quickstart-configure-app-expose-web-apis/portal-02-expose-api.png" alt-text="An app registration's Expose an API pane in the Azure portal":::
5780

5881

59-
6082
1. Next, specify the scope's attributes in the **Add a scope** pane. For this walk-through, you can use the example values or specify your own.
6183

6284
| Field | Description | Example |

articles/active-directory/develop/reference-claims-mapping-policy-type.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -257,13 +257,10 @@ Restricted Claim type (URI):
257257
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/groups`
258258
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid`
259259
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/ispersistent`
260-
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarygroupsid`
261-
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid`
262260
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/role`
263261
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/role`
264262
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/samlissuername`
265263
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/wids`
266-
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname`
267264
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsdeviceclaim`
268265
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsdevicegroup`
269266
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsfqbnversion`
@@ -272,14 +269,9 @@ Restricted Claim type (URI):
272269
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authentication`
273270
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/authorizationdecision`
274271
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid`
275-
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress`
276-
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name`
277-
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier`
278272
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/privatepersonalidentifier`
279-
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/sid`
280273
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/spn`
281274
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn`
282-
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishedname`
283275
- `http://schemas.xmlsoap.org/ws/2009/09/identity/claims/actor`
284276

285277

articles/active-directory/develop/saml-claims-customization.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,10 +210,14 @@ When the following conditions occur after **Add** or **Run test** is selected, a
210210

211211
## Add the UPN claim to SAML tokens
212212

213-
The `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn` claim is part of the [SAML restricted claim set](reference-claims-mapping-policy-type.md), so you can't add it in the **Attributes & Claims** section. As a workaround, you can add it as an [optional claim](./optional-claims.md) through **App registrations** in the Azure portal.
213+
The `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn` claim is part of the [SAML restricted claim set](reference-claims-mapping-policy-type.md#saml-restricted-claim-set). If you have custom signing key configured, you can add it in the **Attributes & Claims** section.
214214

215+
In case there is no custom signing key configured, please refer to [SAML Restricted claim set](reference-claims-mapping-policy-type.md#saml-restricted-claim-set). You can add it as an [optional claim](./optional-claims.md) through **App registrations** in the Azure portal.
216+
215217
Open the application in **App registrations**, select **Token configuration**, and then select **Add optional claim**. Select the **SAML** token type, choose **upn** from the list, and then click **Add** to add the claim to the token.
216218

219+
Customization done in the **Attributes & Claims** section can overwrite the optional claims in the **App Registration**.
220+
217221
## Emit claims based on conditions
218222

219223
You can specify the source of a claim based on user type and the group to which the user belongs.

articles/active-directory/develop/whats-new-docs.md

Lines changed: 11 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
author: henrymbuguakiarie
66
manager: CelesteDG
77

8-
ms.date: 08/01/2023
8+
ms.date: 09/04/2023
99
ms.service: active-directory
1010
ms.subservice: develop
1111
ms.topic: reference
@@ -18,6 +18,16 @@ ms.custom: has-adal-ref
1818

1919
Welcome to what's new in the Microsoft identity platform documentation. This article lists new docs that have been added and those that have had significant updates in the last three months.
2020

21+
## August 2023
22+
23+
### Updated articles
24+
25+
- [Call an ASP.NET Core web API with cURL](howto-call-a-web-api-with-curl.md) - Updated sign-in steps for admin center
26+
- [Troubleshoot publisher verification](troubleshoot-publisher-verification.md) - Removed references to aad.portal.azure.com and terminology updates for partner program updates
27+
- [Configure a custom claim provider token issuance event (preview)](custom-extension-get-started.md) - Updated MS Graph sections - custom claim provider token issuance event tutorial and custom authentication extensions references
28+
- [Customize claims issued in the JSON web token (JWT) for enterprise applications](jwt-claims-customization.md) - Updated sign-in steps for admin center
29+
- [Access tokens in the Microsoft identity platform](access-tokens.md) - Updated details about issuer validation
30+
2131
## July 2023
2232

2333
### New articles
@@ -51,33 +61,3 @@ Welcome to what's new in the Microsoft identity platform documentation. This art
5161
- [Tokens and claims overview](security-tokens.md) - Editorial review of security tokens
5262
- [Tutorial: Sign in users and call Microsoft Graph from an iOS or macOS app](tutorial-v2-ios.md) - Editorial review
5363
- [What's new for authentication?](reference-breaking-changes.md) - Identity breaking change: omission of unverified emails by default
54-
55-
## May 2023
56-
57-
### New articles
58-
59-
- [Access token claims reference](access-token-claims-reference.md)
60-
- [Directory extension attributes in claims](schema-extensions.md)
61-
- [Provide optional claims to your app](optional-claims.md)
62-
63-
### Updated articles
64-
65-
- [Application and service principal objects in Azure Active Directory](app-objects-and-service-principals.md)
66-
- [What's new for authentication?](reference-breaking-changes.md)
67-
- [A web app that calls web APIs: Acquire a token for the app](scenario-web-app-call-api-acquire-token.md)
68-
- [A web app that calls web APIs: Code configuration](scenario-web-app-call-api-app-configuration.md)
69-
- [A web app that calls web APIs: Call a web API](scenario-web-app-call-api-call-api.md)
70-
- [A web API that calls web APIs: Acquire a token for the app](scenario-web-api-call-api-acquire-token.md)
71-
- [A web API that calls web APIs: Code configuration](scenario-web-api-call-api-app-configuration.md)
72-
- [A web API that calls web APIs: Call an API](scenario-web-api-call-api-call-api.md)
73-
- [Confidential client assertions](msal-net-client-assertions.md)
74-
- [Customize claims issued in the JSON web token (JWT) for enterprise applications (Preview)](jwt-claims-customization.md)
75-
- [Customize claims issued in the SAML token for enterprise applications](saml-claims-customization.md)
76-
- [Desktop app that calls web APIs: Acquire a token by using WAM](scenario-desktop-acquire-token-wam.md)
77-
- [Desktop app that calls web APIs: Acquire a token interactively](scenario-desktop-acquire-token-interactive.md)
78-
- [Handle errors and exceptions in MSAL for Python](msal-error-handling-python.md)
79-
- [Protected web API: Code configuration](scenario-protected-web-api-app-configuration.md)
80-
- [Shared device mode for iOS devices](msal-ios-shared-devices.md)
81-
- [Tutorial: Sign in users and call the Microsoft Graph API from an Android application](tutorial-v2-android.md)
82-
- [Tutorial: Sign in users and call the Microsoft Graph API from an Angular single-page application (SPA) using auth code flow](tutorial-v2-angular-auth-code.md)
83-
- [Web app that signs in users: Code configuration](scenario-web-app-sign-user-app-configuration.md)
-11.9 KB
Loading

0 commit comments

Comments
 (0)