You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md
+26-13Lines changed: 26 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -186,31 +186,44 @@ Within the [SCIM 2.0 protocol specification](http://www.simplecloud.info/#Specif
186
186
|Modify users or groups with PATCH requests|[section 3.5.2](https://tools.ietf.org/html/rfc7644#section-3.5.2). Supporting ensures that groups and users are provisioned in a performant manner.|
187
187
|Retrieve a known resource for a user or group created earlier|[section 3.4.1](https://tools.ietf.org/html/rfc7644#section-3.4.1)|
188
188
|Query users or groups|[section 3.4.2](https://tools.ietf.org/html/rfc7644#section-3.4.2). By default, users are retrieved by their `id` and queried by their `username` and `externalId`, and groups are queried by `displayName`.|
189
-
|Query user by ID and by manager|section 3.4.2|
190
-
|Query groups by ID and by member|section 3.4.2|
191
189
|The filter [excludedAttributes=members](#get-group) when querying the group resource|section 3.4.2.5|
192
190
|Accept a single bearer token for authentication and authorization of AAD to your application.||
193
191
|Soft-deleting a user `active=false` and restoring the user `active=true`|The user object should be returned in a request whether or not the user is active. The only time the user should not be returned is when it is hard deleted from the application.|
194
192
|Support the /Schemas endpoint|[section 7](https://tools.ietf.org/html/rfc7643#page-30) The schema discovery endpoint will be used to discover additional attributes.|
195
193
196
194
Use the general guidelines when implementing a SCIM endpoint to ensure compatibility with AAD:
197
195
196
+
##### General:
198
197
*`id` is a required property for all resources. Every response that returns a resource should ensure each resource has this property, except for `ListResponse` with zero members.
199
-
* Response to a query/filter request should always be a `ListResponse`.
200
-
* Groups are optional, but only supported if the SCIM implementation supports **PATCH** requests.
198
+
* Values sent should be stored in the same format as what the were sent in. Invalid values should be rejected with a descriptive, actionable error message. Transformations of data should not happen between data being sent by Azure AD and data being stored in the SCIM application. (e.g. A phone number sent as 55555555555 should not be saved/returned as +5 (555) 555-5555)
201
199
* It isn't necessary to include the entire resource in the **PATCH** response.
202
-
* Microsoft AAD only uses the following operators: `eq`, `and`
203
200
* Don't require a case-sensitive match on structural elements in SCIM, in particular **PATCH**`op` operation values, as defined in [section 3.5.2](https://tools.ietf.org/html/rfc7644#section-3.5.2). AAD emits the values of `op` as **Add**, **Replace**, and **Remove**.
204
201
* Microsoft AAD makes requests to fetch a random user and group to ensure that the endpoint and the credentials are valid. It's also done as a part of the **Test Connection** flow in the [Azure portal](https://portal.azure.com).
202
+
* Support HTTPS on your SCIM endpoint.
203
+
* Custom complex and multivalued attributes are supported but AAD does not have many complex data structures to pull data from in these cases. Simple paired name/value type complex attributes can be mapped to easily, but flowing data to complex attributes with three or more subattributes are not well supported at this time.
204
+
205
+
##### Retrieving Resources:
206
+
* Response to a query/filter request should always be a `ListResponse`.
207
+
* Microsoft AAD only uses the following operators: `eq`, `and`
205
208
* The attribute that the resources can be queried on should be set as a matching attribute on the application in the [Azure portal](https://portal.azure.com), see [Customizing User Provisioning Attribute Mappings](customize-application-attributes.md).
209
+
210
+
##### /Users:
206
211
* The entitlements attribute is not supported.
207
-
* Support HTTPS on your SCIM endpoint.
208
-
*[Schema discovery](#schema-discovery)
209
-
* Schema discovery is not currently supported on the custom application, but it is being used on certain gallery applications. Going forward, schema discovery will be used as the sole method to add additional attributes to an existing connector.
210
-
* If a value is not present, do not send null values.
211
-
* Property values should be camel cased (e.g. readWrite).
212
-
* Must return a list response.
213
-
* The /schemas request will be made by the Azure AD SCIM client every time someone saves the provisioning configuration in the Azure Portal or every time a user lands on the edit provisioning page in the Azure Portal. Any additional attributes discovered will be surfaced to customers in the attribute mappings under the target attribute list. Schema discovery only leads to additional target attributes being added. It will not result in attributes being removed.
212
+
* Any attributes that are considered for user uniqueness must be usable as part of a filtered query. (e.g. if user uniqueness is evaluated for both userName and emails[type eq "work"], a GET to /Users with a filter must allow for both _userName eq "[email protected]"_ and _emails[type eq "work"] eq "[email protected]"_ queries.
213
+
214
+
##### /Groups:
215
+
* Groups are optional, but only supported if the SCIM implementation supports **PATCH** requests.
216
+
* Groups must have uniqueness on the 'displayName' value for the purpose of matching between Azure Active Directory and the SCIM application. This is not a requirement of the SCIM protocol, but is a requirement for integrating a SCIM service with Azure Active Directory.
217
+
218
+
##### /Schemas (Schema discovery):
219
+
220
+
*[Sample request/response](#schema-discovery)
221
+
* Schema discovery is not currently supported on the custom non-gallery SCIM application, but it is being used on certain gallery applications. Going forward, schema discovery will be used as the sole method to add additional attributes to the schema of an existing gallery SCIM application.
222
+
* If a value is not present, do not send null values.
223
+
* Property values should be camel cased (e.g. readWrite).
224
+
* Must return a list response.
225
+
* The /schemas request will be made by the Azure AD SCIM client every time someone saves the provisioning configuration in the Azure Portal or every time a user lands on the edit provisioning page in the Azure Portal. Any additional attributes discovered will be surfaced to customers in the attribute mappings under the target attribute list. Schema discovery only leads to additional target attributes being added. It will not result in attributes being removed.
226
+
214
227
215
228
### User provisioning and deprovisioning
216
229
@@ -1335,7 +1348,7 @@ The SCIM spec doesn't define a SCIM-specific scheme for authentication and autho
1335
1348
1336
1349
|Authorizationmethod|Pros|Cons|Support|
1337
1350
|--|--|--|--|
1338
-
|Usernameandpassword (notrecommendedorsupportedbyAzureAD)|Easytoimplement|Insecure- [YourPa$$worddoesn't matter](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/your-pa-word-doesn-t-matter/ba-p/731984)|Supported on a case-by-case basis for gallery apps. Not supported for non-gallery apps.|
1351
+
|Usernameandpassword (notrecommendedorsupportedbyAzureAD)|Easytoimplement|Insecure- [YourPa$$worddoesn't matter](https://techcommunity.microsoft.com/t5/azure-active-directory-identity/your-pa-word-doesn-t-matter/ba-p/731984)|Not supported for new gallery or non-gallery apps.|
# Features and licenses for Azure AD Multi-Factor Authentication
18
18
19
-
To protect user accounts in your organization, multi-factor authentication should be used. This feature is especially important for accounts that have privileged access to resources. Basic multi-factor authentication features are available to Microsoft 365 and Azure Active Directory (Azure AD) administrators for no extra cost. If you want to upgrade the features for your admins or extend multi-factor authentication to the rest of your users, you can purchase Azure AD Multi-Factor Authentication in several ways.
19
+
To protect user accounts in your organization, multi-factor authentication should be used. This feature is especially important for accounts that have privileged access to resources. Basic multi-factor authentication features are available to Microsoft 365 and Azure Active Directory (Azure AD) global administrators for no extra cost. If you want to upgrade the features for your admins or extend multi-factor authentication to the rest of your users, you can purchase Azure AD Multi-Factor Authentication in several ways.
20
20
21
21
> [!IMPORTANT]
22
22
> This article details the different ways that Azure AD Multi-Factor Authentication can be licensed and used. For specific details about pricing and billing, see the [Azure AD Multi-Factor Authentication pricing page](https://azure.microsoft.com/pricing/details/multi-factor-authentication/).
Copy file name to clipboardExpand all lines: articles/active-directory/conditional-access/concept-continuous-access-evaluation.md
+8-2Lines changed: 8 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,14 +47,14 @@ Continuous access evaluation is implemented by enabling services, like Exchange
47
47
- Administrator explicitly revokes all refresh tokens for a user
48
48
- High user risk detected by Azure AD Identity Protection
49
49
50
-
This process enables the scenario where users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within mins after one of these critical events.
50
+
This process enables the scenario where users lose access to organizational SharePoint Online files, email, calendar, or tasks, and Teams from Microsoft 365 client apps within minutes after one of these critical events.
51
51
52
52
> [!NOTE]
53
53
> Teams and SharePoint Online does not support user risk events yet.
Exchange and SharePoint are able to synchronize key Conditional Access policies so they can be evaluated within the service itself.
57
+
Exchange Online, SharePoint Online, Teams, and MS Graph are able to synchronize key Conditional Access policies so they can be evaluated within the service itself.
58
58
59
59
This process enables the scenario where users lose access to organizational files, email, calendar, or tasks from Microsoft 365 client apps or SharePoint Online immediately after network location changes.
60
60
@@ -75,6 +75,12 @@ This process enables the scenario where users lose access to organizational file
Before continuous access evaluation, clients would always try to replay the access token from its cache as long as it was not expired. With CAE, we are introducing a new case that a resource provider can reject a token even when it is not expired. In order to inform clients to bypass their cache even though the cached tokens have not expired, we introduce a mechanism called **claim challenge** to indicate that the token was rejected and a new access token need to be issued by Azure AD. CAE requires a client update to understand claim challenge. The latest version of the following applications below support claim challenge:
0 commit comments