Skip to content

Commit 5bbe87c

Browse files
authored
Merge pull request #101363 from MicrosoftDocs/master
Merge Master to Live, 3 AM
2 parents 05cdbb7 + 02fecf9 commit 5bbe87c

File tree

131 files changed

+2911
-2793
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

131 files changed

+2911
-2793
lines changed

.openpublishing.redirection.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -165,6 +165,16 @@
165165
"redirect_url": "/azure/machine-learning/service/how-to-deploy-fpga-web-service",
166166
"redirect_document_id": false
167167
},
168+
{
169+
"source_path": "articles/machine-learning/how-to-debug-batch-predictions.md",
170+
"redirect_url": "/azure/machine-learning/how-to-debug-parallel-run-step",
171+
"redirect_document_id": false
172+
},
173+
{
174+
"source_path": "articles/machine-learning/how-to-run-batch-predictions.md",
175+
"redirect_url": "/azure/machine-learning/how-to-use-parallel-run-step",
176+
"redirect_document_id": false
177+
},
168178
{
169179
"source_path": "articles/machine-learning/service/quickstart-run-local-notebook.md",
170180
"redirect_url": "/azure/machine-learning/service/how-to-configure-environment#local",
@@ -40435,6 +40445,21 @@
4043540445
"redirect_url": "/azure/azure-monitor/platform/data-collector-api",
4043640446
"redirect_document_id": false
4043740447
},
40448+
{
40449+
"source_path": "articles/cognitive-services/personalizer/python-quickstart-commandline-feedback-loop-sdk.md",
40450+
"redirect_url": "/azure/cognitive-services/personalizer/sdk-learning-loop?pivots=programming-language-python",
40451+
"redirect_document_id": false
40452+
},
40453+
{
40454+
"source_path": "articles/cognitive-services/personalizer/quickstart-command-line-feedback-loop-nodejs-sdk.md",
40455+
"redirect_url": "/azure/cognitive-services/personalizer/sdk-learning-loop?pivots=programming-language-nodejs",
40456+
"redirect_document_id": false
40457+
},
40458+
{
40459+
"source_path": "articles/cognitive-services/personalizer/csharp-quickstart-commandline-feedback-loop.md",
40460+
"redirect_url": "/azure/cognitive-services/personalizer/sdk-learning-loop?pivots=programming-language-csharp",
40461+
"redirect_document_id": false
40462+
},
4043840463
{
4043940464
"source_path": "articles/cognitive-services/personalizer/personalizer-container-configuration.md",
4044040465
"redirect_url": "/azure/cognitive-services/personalizer/what-is-personalizer",

articles/active-directory-b2c/contentdefinitions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The following example shows the content definition identifier and the definition
3333
<Metadata>
3434
<Item Key="DisplayName">Local account sign up page</Item>
3535
</Metadata>
36-
<LoalizedResourcesReferences MergeBehavior="Prepend">
36+
<LocalizedResourcesReferences MergeBehavior="Prepend">
3737
<LocalizedResourcesReference Language="en" LocalizedResourcesReferenceId="api.localaccountsignup.en" />
3838
<LocalizedResourcesReference Language="es" LocalizedResourcesReferenceId="api.localaccountsignup.es" />
3939
...
-2.91 KB
Loading

articles/active-directory/devices/howto-vm-sign-in-azure-ad-windows.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,9 @@ The following Windows distributions are currently supported during the preview o
4646
- Windows Server 2019 Datacenter
4747
- Windows 10 1809 and later
4848

49+
> [!IMPORTANT]
50+
> Remote connection to VMs joined to Azure AD is only allowed from Windows 10 PCs that are Azure AD joined or hybrid Azure AD joined to the **same** directory as the VM.
51+
4952
The following Azure regions are currently supported during the preview of this feature:
5053

5154
- All Azure global regions
Lines changed: 117 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,117 @@
1+
---
2+
title: Managing consent to applications and evaluating consent requests - Azure AD
3+
description: Learn how to manage consent requests when user consent is disabled or restricted, and how to evaluate a request for tenant-wide admin consent to an application.
4+
services: active-directory
5+
author: psignoret
6+
manager: CelesteDG
7+
8+
ms.service: active-directory
9+
ms.subservice: app-mgmt
10+
ms.workload: identity
11+
ms.topic: conceptual
12+
ms.date: 12/27/2019
13+
ms.author: mimart
14+
ms.reviewer: phsignor
15+
ms.collection: M365-identity-device-management
16+
---
17+
18+
# Managing consent to applications and evaluating consent requests
19+
20+
Microsoft [recommends](https://docs.microsoft.com/azure/security/fundamentals/steps-secure-identity#restrict-user-consent-operations) disabling end-user consent to applications. This will centralize the decision-making process with your organization's security and identity administrator team.
21+
22+
After end-user consent is disabled or restricted, there are several important considerations to ensure your organization stays secure while still allowing business critical applications to be used. These steps are crucial to minimize impact on your organization's support team and IT administrators, while preventing the use of unmanaged accounts in third-party applications.
23+
24+
## Process changes and education
25+
26+
1. Consider enabling the [admin consent workflow (preview)](configure-admin-consent-workflow.md) to allow users to request administrator approval directly from the consent screen.
27+
28+
2. Ensure all administrators understand the [permissions and consent framework](../develop/consent-framework.md), how the [consent prompt](../develop/application-consent-experience.md) works, and how to [evaluate a request for tenant-wide admin consent](#evaluating-a-request-for-tenant-wide-admin-consent).
29+
3. Review your organization's existing processes for users to request administrator approval for an application, and make updates if necessary. If processes are changed:
30+
* Update the relevant documentation, monitoring, automation, and so on.
31+
* Communicate process changes to all affected users, developers, support teams, and IT administrators.
32+
33+
## Auditing and monitoring
34+
35+
1. [Audit apps and granted permissions](https://docs.microsoft.com/azure/security/fundamentals/steps-secure-identity#audit-apps-and-consented-permissions) in your organization to ensure no unwarranted or suspicious applications have previously been granted access to data.
36+
37+
2. Review [Detect and Remediate Illicit Consent Grants in Office 365](https://docs.microsoft.com/microsoft-365/security/office-365-security/detect-and-remediate-illicit-consent-grants) for additional best practices and safeguards against suspicious applications requesting OAuth consent.
38+
39+
3. If your organization has the appropriate license:
40+
41+
* Use additional [OAuth application auditing features in Microsoft Cloud App Security](https://docs.microsoft.com/azure/cloud-app-security/investigate-risky-oauth).
42+
* Use [Azure Monitor Workbooks to monitor permissions and consent](../reports-monitoring/howto-use-azure-monitor-workbooks.md) related activity. The *Consent Insights* workbook provides a view of apps by number of failed consent requests. This can be helpful to prioritize applications for administrators to review and decide whether to grant them admin consent.
43+
44+
### Additional considerations for reducing friction
45+
46+
To minimize impact on trusted, business-critical applications which are already in use, consider proactively granting administrator consent to applications that have a high number of user consent grants:
47+
48+
1. Take an inventory of the apps already added to your organization with high usage, based on sign-in logs or consent grant activity. A PowerShell [script](https://gist.github.com/psignoret/41793f8c6211d2df5051d77ca3728c09) can be used to quickly and easily discover applications with a large number of user consent grants.
49+
50+
2. Evaluate the top applications that have not yet been granted admin consent.
51+
52+
> [!IMPORTANT]
53+
> Carefully evaluate an application before granting tenant-wide admin consent, even if many users in the organization have already consented for themselves.
54+
55+
3. For each application that is approved, grant tenant-wide admin consent using one of the methods documented below.
56+
57+
4. For each approved application, consider [restricting user access](configure-user-consent.md).
58+
59+
## Evaluating a request for tenant-wide admin consent
60+
61+
Granting tenant-wide admin consent is a sensitive operation. Permissions will be granted on behalf of the entire organization, and can include permissions to attempt highly privileged operations. For example, role management, full access to all mailboxes or all sites, and full user impersonation.
62+
63+
Before granting tenant-wide admin consent, you must ensure you trust the application and the application publisher, for the level of access you're granting. If you aren't confident you understand who controls the application and why the application is requesting the permissions, *do not grant consent*.
64+
65+
The following list provides some recommendations to consider when evaluating a request to grant admin consent.
66+
67+
* **Understand the [permissions and consent framework](../develop/consent-framework.md) in the Microsoft identity platform.**
68+
69+
* **Understand the difference between [delegated permissions and application permissions](../develop/v2-permissions-and-consent.md#permission-types).**
70+
71+
Application permissions allow the application to access the data for the entire organization, without any user interaction. Delegated permissions allow the application to act on behalf of a user who at some point was signed into the application.
72+
73+
* **Understand the permissions being requested.**
74+
75+
The permissions requested by the application are listed in the [consent prompt](../develop/application-consent-experience.md). Expanding the permission title will display the permission’s description. The description for application permissions will generally end in "without a signed-in user". The description for delegated permissions will generally end with "on behalf of the signed-in user." Permissions for the Microsoft Graph API are described in [Microsoft Graph Permissions Reference]- refer to the documentation for other APIs to understand the permissions they expose.
76+
77+
If you do not understand a permission being requested, *do not grant consent*.
78+
79+
* **Understand which application is requesting permissions and who published the application.**
80+
81+
Be wary of malicious applications trying to look like other applications.
82+
83+
If you doubt the legitimacy of an application or its publisher, *do not grant consent*. Instead, seek additional confirmation (for example, directly from the application publisher).
84+
85+
* **Ensure the permissions requested are aligned with the features you expect from the application.**
86+
87+
For example, an application offering SharePoint site management may require delegated access to read all site collections, but wouldn't necessarily need full access to all mailboxes, or full impersonation privileges in the directory.
88+
89+
If you suspect the application is requesting more permissions than it needs, *do not grant consent*. Contact the application publisher to obtain more details.
90+
91+
## Granting consent as an administrator
92+
93+
### Granting tenant-wide admin consent
94+
95+
See [Grant tenant-wide admin consent to an application](grant-admin-consent.md) for step-by-step instructions for granting tenant-wide admin consent from the Azure portal, using Azure AD PowerShell, or from the consent prompt itself.
96+
97+
### Granting consent on behalf of a specific user
98+
99+
Instead of granting consent for the entire organization, an administrator can also use the [Azure AD Graph API](https://docs.microsoft.com/azure/active-directory/develop/active-directory-graph-api) to grant consent to delegated permissions on behalf of a single user. To do this, send a `POST` request to create an [OAuth2PermissionGrant](https://docs.microsoft.com/previous-versions/azure/ad/graph/api/entity-and-complex-type-reference#oauth2permissiongrant-entity) entity where `consentType` is set to "Principal", and `principalId` is set to the object ID for the user on behalf of whom consent is being granted.
100+
101+
## Limiting user access to applications
102+
103+
Users' access to applications can still be limited even when tenant-wide admin consent has been granted. For more information on how to require user assignment to an application, see [methods for assigning users and groups](methods-for-assigning-users-and-groups.md).
104+
105+
For more a broader overview including how to handle additional complex scenarios, see [using Azure AD for application access management](what-is-access-management.md).
106+
107+
## Next steps
108+
109+
[Five steps to securing your identity infrastructure](https://docs.microsoft.com/azure/security/fundamentals/steps-secure-identity#before-you-begin-protect-privileged-accounts-with-mfa)
110+
111+
[Configure the admin consent workflow](configure-admin-consent-workflow.md)
112+
113+
[Configure how end-users consent to applications](configure-user-consent.md)
114+
115+
[Permissions and consent in the Microsoft identity platform](../develop/active-directory-v2-scopes.md)
116+
117+
[Azure AD on StackOverflow](https://stackoverflow.com/questions/tagged/azure-active-directory)

articles/active-directory/manage-apps/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -141,6 +141,8 @@
141141
items:
142142
- name: Configure user consent
143143
href: configure-user-consent.md
144+
name: Manage and evaluate consent requests
145+
href: manage-consent-requests.md
144146
- name: Grant tenant-wide admin consent
145147
href: grant-admin-consent.md
146148
- name: Configure admin consent workflow (preview)

articles/active-directory/saas-apps/adobe-creative-cloud-tutorial.md

Lines changed: 15 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ ms.collection: M365-identity-device-management
2222

2323
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Adobe Creative Cloud
2424

25+
> [!NOTE]
26+
> This article describes Adobe Admin Console's custom SAML-based setup for Azure Active Directory (Azure AD). For brand-new configurations, we recommend that you use the [Azure AD Connector](https://helpx.adobe.com/enterprise/using/sso-setup-azure.html). Azure AD Connector can be set up in minutes and shortens the process of domain claim, single sign-on setup, and user sync.
27+
2528
In this tutorial, you'll learn how to integrate Adobe Creative Cloud with Azure Active Directory (Azure AD). When you integrate Adobe Creative Cloud with Azure AD, you can:
2629

2730
* Control in Azure AD who has access to Adobe Creative Cloud.
@@ -108,7 +111,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
108111
> [!NOTE]
109112
> Users need to have a valid Office 365 ExO license for email claim value to be populated in the SAML response.
110113

111-
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
114+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Data XML**, and then select **Download** to download the XML metadata file and save it on your computer.
112115

113116
![The Certificate download link](common/certificatebase64.png)
114117

@@ -148,31 +151,26 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
148151

149152
## Configure Adobe Creative Cloud SSO
150153

151-
1. In a different web browser window, sign-in to [Adobe Admin Console](https://adminconsole.adobe.com) as an administrator.
152-
153-
2. Go to **Settings** on the top navigation bar and then choose **Identity**. The list of domains opens. Click **Configure** link against your domain. Then perform the following steps on **Single Sign On Configuration Required** section. For more information, see [Setup a domain](https://helpx.adobe.com/enterprise/using/set-up-domain.html)
154-
155-
![Settings](https://helpx.adobe.com/content/dam/help/en/enterprise/using/configure-microsoft-azure-with-adobe-sso/_jcr_content/main-pars/procedure_719391630/proc_par/step_3/step_par/image/edit-sso-configuration.png "Settings")
154+
1. In a different web browser window, sign in to [Adobe Admin Console](https://adminconsole.adobe.com) as a system administrator.
156155

157-
a. Click **Browse** to upload the downloaded certificate from Azure AD to **IDP Certificate**.
156+
1. Go to **Settings** on the top navigation bar, and then choose **Identity**. The list of directories opens. Select the Federated directory you want.
158157

159-
b. In the **IDP issuer** textbox, paste the value of **Azure AD Identifier** which you copied from Azure portal.
158+
1. On the **Directory Details** page, select **Configure**.
160159

161-
c. In the **IDP Login URL** textbox, paste the value of **Login URL** which you copied from Azure portal.
160+
1. Copy the Entity ID and the ACS URL (Assertion Consumer Service URL or Reply URL). Enter the URLs at the appropriate fields in the Azure portal.
162161

163-
d. Select **HTTP - Redirect** as **IDP Binding**.
162+
![Configure single sign-on on the app side](./media/adobe-creative-cloud-tutorial/tutorial_adobe-creative-cloud_003.png)
164163

165-
e. Select **Email Address** as **User Login Setting**.
164+
a. Use the Entity ID value Adobe provided you for **Identifier** in the **Configure App Settings** dialog box.
166165

167-
f. Click **Save** button.
166+
b. Use the ACS URL (Assertion Consumer Service URL) value Adobe provided you for **Reply URL** in the **Configure App Settings** dialog box.
168167

169-
3. The dashboard will now present the XML **"Download Metadata"** file. It contains Adobe’s EntityDescriptor URL and AssertionConsumerService URL. Please open the file and configure them in the Azure AD application.
168+
1. Near the bottom of the page, upload the **Federation Data XML** file that you downloaded from the Azure portal.
170169

171-
![Configure Single Sign-On On App Side](./media/adobe-creative-cloud-tutorial/tutorial_adobe-creative-cloud_003.png)
170+
![Federation Data XML file](https://helpx.adobe.com/content/dam/help/en/enterprise/kb/configure-microsoft-azure-with-adobe-sso/jcr_content/main-pars/procedure/proc_par/step_228106403/step_par/image_copy/saml_signinig_certificate.png "IdP Metadata XML")
172171

173-
a. Use the EntityDescriptor value Adobe provided you for **Identifier** on the **Configure App Settings** dialog.
172+
1. Select **Save**.
174173

175-
b. Use the AssertionConsumerService value Adobe provided you for **Reply URL** on the **Configure App Settings** dialog.
176174

177175
### Create Adobe Creative Cloud test user
178176

@@ -205,7 +203,7 @@ When you click the Adobe Creative Cloud tile in the Access Panel, you should be
205203

206204
- [Try Adobe Creative Cloud with Azure AD](https://aad.portal.azure.com/)
207205

208-
- [Set up a domain (adobe.com)](https://helpx.adobe.com/enterprise/using/set-up-domain.html)
206+
- [Set up an identity (adobe.com)](https://helpx.adobe.com/enterprise/using/set-up-identity.html)
209207

210208
- [Configure Azure for use with Adobe SSO (adobe.com)](https://helpx.adobe.com/enterprise/kb/configure-microsoft-azure-with-adobe-sso.html)
211209

articles/active-directory/saas-apps/andfrankly-tutorial.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -122,19 +122,15 @@ To configure Azure AD single sign-on with &frankly, perform the following steps:
122122

123123
![The Certificate download link](common/metadataxml.png)
124124

125-
7. On the **Set up &frankly** section, copy the appropriate URL(s) as per your requirement.
126125

127-
![Copy configuration URLs](common/copy-configuration-urls.png)
126+
### Configure &frankly single sign-on
128127

129-
a. Login URL
128+
To enable single sign-on in &frankly:
130129

131-
b. Azure Ad Identifier
132-
133-
c. Logout URL
134-
135-
### Configure &frankly Single Sign-On
136-
137-
To configure single sign-on on **&frankly** side, you need to send the downloaded **Federation Metadata XML** and appropriate copied URLs from Azure portal to [&frankly support team](mailto:[email protected]). They set this setting to have the SAML SSO connection set properly on both sides.
130+
1. Log in to &frankly. Go to **Account** > **User Management**.
131+
1. Change the authentication mechanism from the default to **Enterprise Sign-on (SAML)**.
132+
1. Upload the **Federation Metadata XML** that you downloaded in step 6 in the preceding section.
133+
1. Select **Save**.
138134

139135
### Create an Azure AD test user
140136

@@ -203,4 +199,4 @@ When you click the &frankly tile in the Access Panel, you should be automaticall
203199

204200
- [What is application access and single sign-on with Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
205201

206-
- [What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
202+
- [What is Conditional Access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)

0 commit comments

Comments
 (0)