You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -48,10 +48,6 @@ First, register the web API in your Azure AD tenant and add a scope by following
48
48
49
49
[Download the ASP.NET Core solution](https://github.com/Azure-Samples/active-directory-dotnet-native-aspnetcore-v2/archive/aspnetcore3-1.zip) from GitHub.
50
50
51
-
> [!Note]
52
-
> The code sample currently targets ASP.NET Core 3.1. The sample can be updated to use .NET Core 6.0 and is covered in the following steps: [Update the sample code to ASP.NET Core 6.0](#step-4-update-the-sample-code-to-aspnet-core-60)
53
-
This quickstart will be deprecated in the near future and will be updated to use .NET 6.0.
54
-
55
51
## Step 3: Configure the ASP.NET Core project
56
52
57
53
In this step, the sample code will be configured to work with the app registration that was created earlier.
@@ -74,26 +70,7 @@ In this step, the sample code will be configured to work with the app registrati
74
70
75
71
For this quickstart, don't change any other values in the *appsettings.json* file.
76
72
77
-
### Step 4: Update the sample code to ASP.NET Core 6.0
78
-
79
-
To update this code sample to target ASP.NET Core 6.0, follow these steps:
80
-
81
-
1. Open webapi.csproj
82
-
1. Remove the following line:
83
-
84
-
```xml
85
-
<TargetFramework>netcoreapp3.1</TargetFramework>
86
-
```
87
-
88
-
1. Add the following line in its place:
89
-
90
-
```xml
91
-
<TargetFramework>netcoreapp6.0</TargetFramework>
92
-
```
93
-
94
-
This step will ensure that the sample is targeting the .NET Core 6.0 framework.
95
-
96
-
### Step 5: Run the sample
73
+
### Step 4: Run the sample
97
74
98
75
1. Open a terminal and change directory to the project folder.
99
76
@@ -167,31 +144,28 @@ public void Configure(IApplicationBuilder app, IHostingEnvironment env)
Copy file name to clipboardExpand all lines: articles/active-directory/develop/includes/web-app/quickstart-aspnet-core.md
+2-25Lines changed: 2 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.subservice: develop
10
10
ms.topic: quickstart
11
11
ms.workload: identity
12
12
13
-
ms.date: 12/19/2022
13
+
ms.date: 04/16/2023
14
14
ms.author: cwerner
15
15
16
16
ms.reviewer: jmprieur
@@ -50,10 +50,6 @@ See [How the sample works](#how-the-sample-works) for an illustration.
50
50
51
51
[Download the ASP.NET Core solution](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/archive/aspnetcore3-1-callsgraph.zip)
52
52
53
-
> [!Note]
54
-
> The code sample currently targets ASP.NET Core 3.1. The sample can be updated to use .NET Core 6.0 and is covered in the following steps: [Update the sample code to ASP.NET Core 6.0](#step-4-update-the-sample-code-to-aspnet-core-60)
55
-
This quickstart will be deprecated in the near future and will be updated to use .NET 6.0.
56
-
57
53
### Step 3: Configure your ASP.NET Core project
58
54
59
55
1. Extract the *.zip* file to a local folder that's close to the root of the disk to avoid errors caused by path length limitations on Windows. For example, extract to *C:\Azure-Samples*.
@@ -74,27 +70,8 @@ This quickstart will be deprecated in the near future and will be updated to use
74
70
- Replace `Enter_the_Client_Secret_Here` with the **Client secret** that was created and recorded in an earlier step.
75
71
76
72
For this quickstart, don't change any other values in the *appsettings.json* file.
77
-
78
-
### Step 4: Update the sample code to ASP.NET Core 6.0
79
-
80
-
To update this code sample to target ASP.NET Core 6.0, follow these steps:
81
-
82
-
1. Open WebApp-OpenIDConnect-DotNet.csproj
83
-
1. Remove the following line:
84
-
85
-
```xml
86
-
<TargetFramework>netcoreapp3.1</TargetFramework>
87
-
```
88
-
89
-
1. Add the following line in its place:
90
-
91
-
```xml
92
-
<TargetFramework>netcoreapp6.0</TargetFramework>
93
-
```
94
-
95
-
This step will ensure that the sample is targeting the .NET Core 6.0 framework.
96
73
97
-
### Step 5: Build and run the application
74
+
### Step 4: Build and run the application
98
75
99
76
Build and run the app in Visual Studio by selecting the **Debug** menu > **Start Debugging**, or by pressing the F5 key.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/web-app-quickstart-portal-node-js-ciam.md
+4-16Lines changed: 4 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,25 +16,13 @@ ms.date: 04/12/2023
16
16
# Portal quickstart for React SPA
17
17
18
18
> In this quickstart, you download and run a code sample that demonstrates how a React single-page application (SPA) can sign in users with Azure AD CIAM.
Copy file name to clipboardExpand all lines: articles/active-directory/external-identities/authentication-conditional-access.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: B2B
8
8
ms.topic: conceptual
9
-
ms.date: 04/03/2023
9
+
ms.date: 04/17/2023
10
10
11
11
ms.author: mimart
12
12
author: msmimart
@@ -64,13 +64,13 @@ The following diagram illustrates the flow when email one-time passcode authenti
64
64
| Step | Description |
65
65
|--------------|-----------------------|
66
66
|**1**|The user requests access to a resource in another tenant. The resource redirects the user to its resource tenant, a trusted IdP.|
67
-
|**2**| The resource tenant identifies the user as an [external email one-time passcode (OTP) user](./one-time-passcode.md) and sends an email with the OTP to the user.|
67
+
|**2**| The resource tenant identifies the user as an external email one-time passcode (OTP) user and sends an email with the OTP to the user.|
68
68
| **3** | The user retrieves the OTP and submits the code. The resource tenant evaluates the user against its Conditional Access policies.
69
69
|**4**| Once all Conditional Access policies are satisfied, the resource tenant issues a token and redirects the user to its resource. |
70
70
71
71
## Conditional Access for external users
72
72
73
-
Organizations can enforce [Conditional Access](../conditional-access/overview.md) policies for external B2B collaboration and B2B direct connect users in the same way that they’re enabled for full-time employees and members of the organization. With the introduction of cross-tenant access settings, you can also trust MFA and device claims from external Azure AD organizations. This section describes important considerations for applying Conditional Access to users outside of your organization.
73
+
Organizations can enforce Conditional Access policies for external B2B collaboration and B2B direct connect users in the same way that they’re enabled for full-time employees and members of the organization. With the introduction of cross-tenant access settings, you can also trust MFA and device claims from external Azure AD organizations. This section describes important considerations for applying Conditional Access to users outside of your organization.
74
74
75
75
### Assigning Conditional Access policies to external user types
76
76
@@ -81,7 +81,7 @@ When configuring a Conditional Access policy, you have granular control over the
81
81
-**B2B direct connect users** - External users who are able to access your resources via B2B direct connect, which is a mutual, two-way connection with another Azure AD organization that allows single sign-on access to certain Microsoft applications (currently, Microsoft Teams Connect shared channels). B2B direct connect users don’t have a presence in your Azure AD organization, but are instead managed from within the application (for example, by the Teams shared channel owner).
82
82
-**Local guest users** - Local guest users have credentials that are managed in your directory. Before Azure AD B2B collaboration was available, it was common to collaborate with distributors, suppliers, vendors, and others by setting up internal credentials for them and designating them as guests by setting the user object UserType to Guest.
83
83
-**Service provider users** - Organizations that serve as cloud service providers for your organization (the isServiceProvider property in the Microsoft Graph [partner-specific configuration](/graph/api/resources/crosstenantaccesspolicyconfigurationpartner) is true).
84
-
-**Other external users** - Applies to any users who don't fall into the categories above, but who are not considered internal members of your organization, meaning they don't authenticate internally via Azure AD, and the user object created in the resource Azure AD directory does not have a UserType of Member.
84
+
-**Other external users** - Applies to any users who don't fall into the categories above, but who aren't considered internal members of your organization, meaning they don't authenticate internally via Azure AD, and the user object created in the resource Azure AD directory doesn't have a UserType of Member.
85
85
86
86
>[!NOTE]
87
87
> The "All guest and external users" selection has now been replaced with "Guest and external users" and all its sub types. For customers who previously had a Condtional Access policy with "All guest and external users" selected will now see "Guest and external users" along with all sub types being selected. This change in UX does not have any functional impact on how policy is evaluated by Conditional Access backend. The new selection provides customers the needed granularity to choose specifc types of guest and external users to include/exclude from user scope when creating their Conditional Access policy.
@@ -169,7 +169,7 @@ The following PowerShell cmdlets are available to *proof up* or request MFA regi
169
169
170
170
### Authentication strength policies for external users
171
171
172
-
[Authentication strength](https://aka.ms/b2b-auth-strengths) is a Conditional Access control that lets you define a specific combination of multifactor authentication (MFA) methods that an external user must complete to access your resources. This control is especially useful for restricting external access to sensitive apps in your organization because you can enforce specific authentication methods, such as a phishing-resistant method, for external users.
172
+
Authentication strength is a Conditional Access control that lets you define a specific combination of multifactor authentication (MFA) methods that an external user must complete accessing your resources. This control is especially useful for restricting external access to sensitive apps in your organization because you can enforce specific authentication methods, such as a phishing-resistant method, for external users.
173
173
174
174
You also have the ability to apply authentication strength to the different types of [guest or external users](#assigning-conditional-access-policies-to-external-user-types) that you collaborate or connect with. This means you can enforce authentication strength requirements that are unique to your B2B collaboration, B2B direct connect, and other external access scenarios.
175
175
@@ -229,7 +229,7 @@ When device trust settings are enabled, Azure AD checks a user's authentication
229
229
230
230
### Device filters
231
231
232
-
When creating Conditional Access policies for external users, you can evaluate a policy based on the device attributes of a registered device in Azure AD. By using the *filter for devices* condition, you can target specific devices using the [supported operators and properties](../conditional-access/concept-condition-filters-for-devices.md#supported-operators-and-device-properties-for-filters) and the other available assignment conditions in your Conditional Access policies.
232
+
When creating Conditional Access policies for external users, you can evaluate a policy based on the device attributes of a registered device in Azure AD. By using the *filter for devices* condition, you can target specific devices using the supported operators and properties and the other available assignment conditions in your Conditional Access policies.
233
233
234
234
Device filters can be used together with cross-tenant access settings to base policies on devices that are managed in other organizations. For example, suppose you want to block devices from an external Azure AD tenant based on a specific device attribute. You can set up a device attribute-based policy by doing the following:
235
235
@@ -279,7 +279,5 @@ For more information, see [Identity Protection and B2B users](../identity-protec
279
279
For more information, see the following articles:
280
280
281
281
-[Zero Trust policies for allowing guest access and B2B external user access](/microsoft-365/security/office-365-security/identity-access-policies-guest-access?view=o365-worldwide&preserve-view=true)
282
-
-[What is Azure AD B2B collaboration?](./what-is-b2b.md)
283
282
-[Identity Protection and B2B users](../identity-protection/concept-identity-protection-b2b.md)
In this article, you learn how to configure permissions classifications in Azure Active Directory (Azure AD). Permission classifications allow you to identify the impact that different permissions have according to your organization's policies and risk evaluations. For example, you can use permission classifications in consent policies to identify the set of permissions that users are allowed to consent to.
23
23
24
-
Currently, only the "Low impact" permission classification is supported. Only delegated permissions that don't require admin consent can be classified as "Low impact".
24
+
Three permission classifications are supported: "Low", "Medium" (preview), and "High" (preview). Currently, only delegated permissions that don't require admin consent can be classified.
25
25
26
26
The minimum permissions needed to do basic sign-in are `openid`, `profile`, `email`, and `offline_access`, which are all delegated permissions on the Microsoft Graph. With these permissions an app can read details of the signed-in user's profile, and can maintain this access even when the user is no longer using the app.
27
27
@@ -30,7 +30,7 @@ The minimum permissions needed to do basic sign-in are `openid`, `profile`, `ema
30
30
To configure permission classifications, you need:
31
31
32
32
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
33
-
- One of the following roles: A global administrator, or owner of the service principal.
33
+
- One of the following roles: Global Administrator, Application Administrator, or Cloud Application Administrator
34
34
35
35
## Manage permission classifications
36
36
@@ -40,7 +40,8 @@ Follow these steps to classify permissions using the Azure portal:
40
40
41
41
1. Sign in to the [Azure portal](https://portal.azure.com) as a [Global Administrator](../roles/permissions-reference.md#global-administrator), [Application Administrator](../roles/permissions-reference.md#application-administrator), or [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator)
42
42
1. Select **Azure Active Directory** > **Enterprise applications** > **Consent and permissions** > **Permission classifications**.
43
-
1. Choose **Add permissions** to classify another permission as "Low impact".
43
+
1. Choose the tab for the permission classification you'd like to update.
44
+
1. Choose **Add permissions** to classify another permission.
44
45
1. Select the API and then select the delegated permission(s).
45
46
46
47
In this example, we've classified the minimum set of permission required for single sign-on:
@@ -57,7 +58,7 @@ You can use the latest [Azure AD PowerShell](/powershell/module/azuread/?preserv
57
58
Run the following command to connect to Azure AD PowerShell. To consent to the required scopes, sign in with one of the roles listed in the prerequisite section of this article.
0 commit comments