Skip to content

Commit 5bcebb0

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents ac642eb + 3d48940 commit 5bcebb0

File tree

105 files changed

+2514
-572
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

105 files changed

+2514
-572
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3863,12 +3863,12 @@
38633863
"redirect_document_id": false
38643864
},
38653865
{
3866-
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema-definitions.md",
3866+
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema.md",
38673867
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema",
38683868
"redirect_document_id": false
38693869
},
38703870
{
3871-
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema.md",
3871+
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema-definitions.md",
38723872
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema",
38733873
"redirect_document_id": false
38743874
},
@@ -3877,6 +3877,11 @@
38773877
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema",
38783878
"redirect_document_id": false
38793879
},
3880+
{
3881+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-common-schema-test-action-definitions.md",
3882+
"redirect_url": "/azure/azure-monitor/alerts/alerts-payload-samples",
3883+
"redirect_document_id": false
3884+
},
38803885
{
38813886
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema-integrations.md",
38823887
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema-integrations",

articles/active-directory-b2c/idp-pass-through-user-flow.md

Lines changed: 72 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 03/10/2022
12+
ms.date: 03/16/2023
1313
ms.custom: project-no-code
1414
ms.author: kengaderdus
1515
ms.subservice: B2C
@@ -150,6 +150,77 @@ When testing your applications in Azure AD B2C, it can be useful to have the Azu
150150

151151
![Decoded token in jwt.ms with idp_access_token block highlighted](./media/idp-pass-through-user-flow/identity-provider-pass-through-token-custom.png)
152152

153+
## Pass the IDP refresh token (optional)
154+
155+
The access token the identity provider returns is valid for a short period of time. Some identity providers also issue a refresh token along with the access token. Your client application can then exchange the identity provider's refresh token for a new access token when needed.
156+
157+
Azure AD B2C custom policy supports passing the refresh token of OAuth 2.0 identity providers, which includes [Facebook](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook-with-access-token), [Google](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#facebook-with-access-token) and [GitHub](https://github.com/azure-ad-b2c/unit-tests/tree/main/Identity-providers#github-with-access-token).
158+
159+
To pass the identity provider's refresh token, follow these steps:
160+
161+
1. Open your *TrustframeworkExtensions.xml* file and add the following **ClaimType** element with an identifier of `identityProviderRefreshToken` to the **ClaimsSchema** element.
162+
163+
```xml
164+
<ClaimType Id="identityProviderRefreshToken">
165+
<DisplayName>Identity provider refresh token</DisplayName>
166+
<DataType>string</DataType>
167+
</ClaimType>
168+
```
169+
170+
1. Add the **OutputClaim** element to the **TechnicalProfile** element for each OAuth 2.0 identity provider that you would like the refresh token for. The following example shows the element added to the Facebook technical profile:
171+
172+
```xml
173+
<ClaimsProvider>
174+
<DisplayName>Facebook</DisplayName>
175+
<TechnicalProfiles>
176+
<TechnicalProfile Id="Facebook-OAUTH">
177+
<OutputClaims>
178+
<OutputClaim ClaimTypeReferenceId="identityProviderRefreshToken" PartnerClaimType="{oauth2:refresh_token}" />
179+
</OutputClaims>
180+
...
181+
</TechnicalProfile>
182+
</TechnicalProfiles>
183+
</ClaimsProvider>
184+
```
185+
186+
1. Some identity providers require you to include metadata or scopes to the identity provider's technical profile.
187+
188+
- For Google identity provider, add two claim types `access_type` and `prompt`. Then add the following input claims to the identity provider's technical profile:
189+
190+
```xml
191+
<InputClaims>
192+
<InputClaim ClaimTypeReferenceId="access_type" PartnerClaimType="access_type" DefaultValue="offline" AlwaysUseDefaultValue="true" />
193+
194+
<!-- The refresh_token is return only on the first authorization for a given user. Subsequent authorization request doesn't return the refresh_token.
195+
To fix this issue we add the prompt=consent query string parameter to the authorization request-->
196+
<InputClaim ClaimTypeReferenceId="prompt" PartnerClaimType="prompt" DefaultValue="consent" AlwaysUseDefaultValue="true" />
197+
</InputClaims>
198+
```
199+
200+
- Other identity providers may have different methods to issue a refresh token. Follow the identity provider's audience and add the necessary elements to your identity provider's technical profile.
201+
202+
1. Save the changes you made in your *TrustframeworkExtensions.xml* file.
203+
1. Open your relying party policy file, such as *SignUpOrSignIn.xml*, and add the **OutputClaim** element to the **TechnicalProfile**:
204+
205+
```xml
206+
<RelyingParty>
207+
<DefaultUserJourney ReferenceId="SignUpOrSignIn" />
208+
<TechnicalProfile Id="PolicyProfile">
209+
<OutputClaims>
210+
<OutputClaim ClaimTypeReferenceId="identityProviderRefreshToken" PartnerClaimType="idp_refresh_token"/>
211+
</OutputClaims>
212+
...
213+
</TechnicalProfile>
214+
</RelyingParty>
215+
```
216+
217+
1. Save the changes you made in your policy's relying party policy file.
218+
1. Upload the *TrustframeworkExtensions.xml* file, and then the relying party policy file.
219+
1. [Test your policy](#test-your-policy)
220+
221+
222+
223+
153224
::: zone-end
154225

155226
## Next steps

articles/active-directory-b2c/relyingparty.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 11/17/2022
11+
ms.date: 03/13/2023
1212
ms.custom: project-no-code
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
@@ -78,6 +78,8 @@ The optional **RelyingParty** element contains the following elements:
7878
| UserJourneyBehaviors | 0:1 | The scope of the user journey behaviors. |
7979
| TechnicalProfile | 1:1 | A technical profile that's supported by the RP application. The technical profile provides a contract for the RP application to contact Azure AD B2C. |
8080

81+
You need to create the **RelyingParty** child elements in the order presented in the preceding table.
82+
8183
## Endpoints
8284

8385
The **Endpoints** element contains the following element:

articles/active-directory/app-proxy/application-proxy-configure-complex-application.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,13 +69,13 @@ To publish complex distributed app through Application Proxy with application se
6969

7070
3. On the Manage and configure application segments page, select "+ Add app segment"
7171

72-
:::image type="content" source="./media/application-proxy-configure-complex-application/add-application-segment-1.png" alt-text="Screenshot pf Manage and configure application segment blade.":::
72+
:::image type="content" source="./media/application-proxy-configure-complex-application/add-application-segment-1.png" alt-text="Screenshot of Manage and configure application segment blade.":::
7373

7474
4. In the Internal Url field, enter the internal URL for your app.
7575

7676
5. In the External Url field, drop down the list and select the custom domain you want to use.
7777

78-
6. Add CORS Rules (optional). For more information see [Configuring CORS Rule](https://learn.microsoft.com/graph/api/resources/corsconfiguration_v2?view=graph-rest-beta)
78+
6. Add CORS Rules (optional). For more information see [Configuring CORS Rule](/graph/api/resources/corsconfiguration_v2?view=graph-rest-beta).
7979

8080
7. Select Create.
8181

articles/active-directory/cloud-infrastructure-entitlement-management/usage-analytics-access-keys.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: ciem
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 02/23/2022
11+
ms.date: 03/01/2023
1212
ms.author: jfields
1313
---
1414

@@ -23,6 +23,9 @@ The **Analytics** dashboard in Permissions Management provides details about ide
2323
- **Access Keys**: Tracks the permission usage of access keys for a given user.
2424
- **Serverless Functions**: Tracks assigned permissions and usage of the serverless functions.
2525

26+
> [!NOTE]
27+
> Currently, Microsoft Azure and Google Cloud Platform (GCP) do not provide significant information about access keys to return access keys data. Access Keys analytics are currently only available for Amazon Web Services (AWS) accounts.
28+
2629
This article describes how to view usage analytics about access keys.
2730

2831
## Create a query to view access keys
@@ -33,8 +36,8 @@ When you select **Access keys**, the **Analytics** dashboard provides a high-lev
3336

3437
The following components make up the **Access Keys** dashboard:
3538

36-
- **Authorization System Type**: Select the authorization you want to use: Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP).
37-
- **Authorization System**: Select from a **List** of accounts and **Folders***.
39+
- **Authorization System Type**: Select **AWS**.
40+
- **Authorization System**: Select from a **List** of accounts and **Folders**.
3841
- **Key Status**: Select **All**, **Active**, or **Inactive**.
3942
- **Key Activity State**: Select **All**, how long the access key has been used, or **Not Used**.
4043
- **Key Age**: Select **All** or how long ago the access key was created.
@@ -68,23 +71,23 @@ Filters can be applied in one, two, or all three categories depending on the typ
6871

6972
### Apply filters by authorization system type
7073

71-
1. From the **Authorization System Type** dropdown, select the authorization system you want to use: **AWS**, **Azure**, or **GCP**.
74+
1. From the **Authorization System Type** dropdown, select **AWS**.
7275
1. Select **Apply** to run your query and display the information you selected.
7376

7477
Select **Reset Filter** to discard your changes.
7578

7679

7780
### Apply filters by authorization system
7881

79-
1. From the **Authorization System Type** dropdown, select the authorization system you want to use: **AWS**, **Azure**, or **GCP**.
82+
1. From the **Authorization System Type** dropdown, select **AWS**.
8083
1. From the **Authorization System** dropdown, select accounts from a **List** of accounts and **Folders**.
8184
1. Select **Apply** to run your query and display the information you selected.
8285

8386
Select **Reset Filter** to discard your changes.
8487

8588
### Apply filters by key status
8689

87-
1. From the **Authorization System Type** dropdown, select the authorization system you want to use: **AWS**, **Azure**, or **GCP**.
90+
1. From the **Authorization System Type** dropdown, select **AWS**.
8891
1. From the **Authorization System** dropdown, select from a **List** of accounts and **Folders**.
8992
1. From the **Key Status** dropdown, select the type of key: **All**, **Active**, or **Inactive**.
9093
1. Select **Apply** to run your query and display the information you selected.
@@ -93,7 +96,7 @@ Filters can be applied in one, two, or all three categories depending on the typ
9396

9497
### Apply filters by key activity status
9598

96-
1. From the **Authorization System Type** dropdown, select the authorization system you want to use: **AWS**, **Azure**, or **GCP**.
99+
1. From the **Authorization System Type** dropdown, select **AWS**.
97100
1. From the **Authorization System** dropdown, select from a **List** of accounts and **Folders**.
98101
1. From the **Key Activity State** dropdown, select **All**, the duration for how long the access key has been used, or **Not Used**.
99102

@@ -103,7 +106,7 @@ Filters can be applied in one, two, or all three categories depending on the typ
103106

104107
### Apply filters by key age
105108

106-
1. From the **Authorization System Type** dropdown, select the authorization system you want to use: **AWS**, **Azure**, or **GCP**.
109+
1. From the **Authorization System Type** dropdown, select **AWS**.
107110
1. From the **Authorization System** dropdown, select from a **List** of accounts and **Folders**.
108111
1. From the **Key Age** dropdown, select **All** or how long ago the access key was created.
109112

@@ -113,7 +116,7 @@ Filters can be applied in one, two, or all three categories depending on the typ
113116

114117
### Apply filters by task type
115118

116-
1. From the **Authorization System Type** dropdown, select the authorization system you want to use: **AWS**, **Azure**, or **GCP**.
119+
1. From the **Authorization System Type** dropdown, select **AWS**.
117120
1. From the **Authorization System** dropdown, select from a **List** of accounts and **Folders**.
118121
1. From the **Task Type** dropdown, select **All** tasks, **High Risk Tasks** or, for a list of tasks where users have deleted data, select **Delete tasks**.
119122
1. Select **Apply** to run your query and display the information you selected.

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,6 @@ The following key applications are affected by the Office 365 cloud app:
9393
- Microsoft Flow
9494
- Microsoft Office 365 Portal
9595
- Microsoft Office client application
96-
- Microsoft Stream
9796
- Microsoft To-Do WebApp
9897
- Microsoft Whiteboard Services
9998
- Office Delve

articles/active-directory/fundamentals/auth-ssh.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# SSH authentication with Azure Active Directory
1919

20-
Secure Shell (SSH) is a network protocol that provides encryption for operating network services securely over an unsecured network. It's commonly used in Unix-based systems such as Linux. SSH replaces the Telnet protocol, which doesn't provide encryption in an unsecured network.
20+
Secure Shell (SSH) is a network protocol that provides encryption for operating network services securely over an unsecured network. It's commonly used in systems like Unix and Linux. SSH replaces the Telnet protocol, which doesn't provide encryption in an unsecured network.
2121

2222
Azure Active Directory (Azure AD) provides a virtual machine (VM) extension for Linux-based systems that run on Azure. It also provides a client extension that integrates with the [Azure CLI](/cli/azure/) and the OpenSSH client.
2323

articles/active-directory/identity-protection/concept-workload-identity-risk.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,8 +57,8 @@ We detect risk on workload identities across sign-in behavior and offline indica
5757
| Suspicious Sign-ins | Offline | This risk detection indicates sign-in properties or patterns that are unusual for this service principal. <br><br> The detection learns the baselines sign-in behavior for workload identities in your tenant in between 2 and 60 days, and fires if one or more of the following unfamiliar properties appear during a later sign-in: IP address / ASN, target resource, user agent, hosting/non-hosting IP change, IP country, credential type. <br><br> Because of the programmatic nature of workload identity sign-ins, we provide a timestamp for the suspicious activity instead of flagging a specific sign-in event. <br><br> Sign-ins that are initiated after an authorized configuration change may trigger this detection. |
5858
| Admin confirmed account compromised | Offline | This detection indicates an admin has selected 'Confirm compromised' in the Risky Workload Identities UI or using riskyServicePrincipals API. To see which admin has confirmed this account compromised, check the account’s risk history (via UI or API). |
5959
| Leaked Credentials | Offline | This risk detection indicates that the account's valid credentials have been leaked. This leak can occur when someone checks in the credentials in public code artifact on GitHub, or when the credentials are leaked through a data breach. <br><br> When the Microsoft leaked credentials service acquires credentials from GitHub, the dark web, paste sites, or other sources, they're checked against current valid credentials in Azure AD to find valid matches. |
60-
| Malicious application | Offline | This detection indicates that Microsoft has disabled an application for violating our terms of service. We recommend [conducting an investigation](https://go.microsoft.com/fwlink/?linkid=2208429) of the application.|
61-
| Suspicious application | Offline | This detection indicates that Microsoft has identified an application that may be violating our terms of service, but hasn't disabled it. We recommend [conducting an investigation](https://go.microsoft.com/fwlink/?linkid=2208429) of the application.|
60+
| Malicious application | Offline | This detection indicates that Microsoft has disabled an application for violating our terms of service. We recommend [conducting an investigation](https://go.microsoft.com/fwlink/?linkid=2208429) of the application. Note: These applications will show `DisabledDueToViolationOfServicesAgreement` on the `disabledByMicrosoftStatus` property on the related [application](/graph/api/resources/application) and [service principal](/graph/api/resources/serviceprincipal) resource types in Microsoft Graph. To prevent them from being instantiated in your organization again in the future, you cannot delete these objects. |
61+
| Suspicious application | Offline | This detection indicates that Microsoft has identified an application that may be violating our terms of service, but hasn't disabled it. We recommend [conducting an investigation](https://go.microsoft.com/fwlink/?linkid=2208429) of the application.|
6262
| Anomalous service principal activity | Offline | This risk detection baselines normal administrative service principal behavior in Azure AD, and spots anomalous patterns of behavior like suspicious changes to the directory. The detection is triggered against the administrative service principal making the change or the object that was changed. |
6363

6464
## Identify risky workload identities
@@ -123,3 +123,4 @@ The [Azure AD Toolkit](https://github.com/microsoft/AzureADToolkit) is a PowerSh
123123
- [Azure AD sign-in logs](../reports-monitoring/concept-sign-ins.md)
124124
- [Simulate risk detections](howto-identity-protection-simulate-risk.md)
125125

126+

articles/active-directory/saas-apps/servicenow-provisioning-tutorial.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Configure ServiceNow for automatic user provisioning with Azure Active Directory
33
description: Learn how to automatically provision and deprovision user accounts from Azure AD to ServiceNow.
44
services: active-directory
5-
author: jeevansd
5+
author: twimmers
66
manager: CelesteDG
77
ms.reviewer: celested
88
ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: how-to
1212
ms.date: 3/10/2023
13-
ms.author: jeedes
13+
ms.author: thwimmer
1414
---
1515

1616
# Configure ServiceNow for automatic user provisioning
@@ -86,6 +86,12 @@ To configure automatic user provisioning for ServiceNow in Azure AD:
8686

8787
1. In the **Admin Credentials** section, enter your ServiceNow tenant URL, Client ID, Client Secret and Authorization Endpoint. Select **Test Connection** to ensure that Azure AD can connect to ServiceNow. [This ServiceNow documentation](https://docs.servicenow.com/bundle/utah-platform-security/page/administer/security/task/t_CreateEndpointforExternalClients.html) outlines how to generate these values.
8888

89+
- Tenant URL: https://**InsertInstanceName**.service-now.com/api/now/scim
90+
- Authorization Endpoint: https://**InsertInstanceName**.service-now.com/oauth_auth.do?response_type=code&client_id=**InsertClientID**&state=1&scope=useraccount&redirect_uri=https%3A%2F%2Fportal.azure.com%2FTokenAuthorize
91+
- Token Endoint: https://**InsertInstanceName**.service-now.com/api/now/scim
92+
93+
![Screenshot that shows the Service Provisioning page, where you can enter admin credentials.](./media/servicenow-provisioning-tutorial/servicenow-provisioning.png)
94+
8995
1. In the **Notification Email** box, enter the email address of a person or group that should receive the provisioning error notifications. Then select the **Send an email notification when a failure occurs** check box.
9096

9197
1. Select **Save**.
@@ -198,7 +204,7 @@ POST https://graph.microsoft.com/beta/servicePrincipals/[object-id]/synchronizat
198204
11. Restore any previous changes you made to the application (Authentication details, Scoping filters, Custom attribute mappings) and re-enable provisioning.
199205

200206
> [!NOTE]
201-
> Failure to restore the previous settings may results in attributes (name.formatted for example) updating in Workplace unexpectedly. Be sure to check the configuration before enabling provisioning
207+
> Failure to restore the previous settings may results in attributes (name.formatted for example) updating in ServiceNow unexpectedly. Be sure to check the configuration before enabling provisioning
202208
203209
## Additional resources
204210

0 commit comments

Comments
 (0)