Skip to content

Commit 5c6c563

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-aadroles-role-windows-admin
2 parents 35d60de + 4b99292 commit 5c6c563

File tree

18 files changed

+254
-245
lines changed

18 files changed

+254
-245
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46507,6 +46507,11 @@
4650746507
"source_path_from_root": "/articles/virtual-desktop/diagnostics-role-service.md",
4650846508
"redirect_url": "/azure/virtual-desktop/troubleshoot-set-up-overview",
4650946509
"redirect_document_id": false
46510+
},
46511+
{
46512+
"source_path_from_root": "/articles/azure-monitor/app/how-do-i.md",
46513+
"redirect_url": "/azure/azure-monitor/faq",
46514+
"redirect_document_id": false
4651046515
}
4651146516
]
4651246517
}

articles/active-directory-b2c/partner-f5.md

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,14 @@
22
title: Tutorial to configure Azure Active Directory B2C with F5 BIG-IP
33
titleSuffix: Azure AD B2C
44
description: Learn how to integrate Azure AD B2C authentication with F5 BIG-IP for secure hybrid access
5-
services: active-directory-b2c
65
author: gargi-sinha
6+
ms.author: gasinh
77
manager: martinco
88
ms.service: active-directory
9+
ms.subservice: B2C
910
ms.workload: identity
1011
ms.topic: how-to
1112
ms.date: 10/15/2021
12-
ms.author: gasinh
13-
ms.subservice: B2C
1413
---
1514

1615
# Tutorial: Extend Azure Active Directory B2C to protect on-premises applications using F5 BIG-IP
@@ -26,9 +25,9 @@ It provides an abundance of features including application-level inspection and
2625

2726
To get started, you'll need:
2827

29-
- An [Azure AD B2C tenant](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-create-tenant) linked to your Azure subscription
28+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) linked to your Azure subscription
3029

31-
- An existing BIG-IP or deploy a trial [BIG-IP Virtual Environment (VE) on Azure](https://docs.microsoft.com/azure/active-directory/manage-apps/f5-bigip-deployment-guide)
30+
- An existing BIG-IP or deploy a trial [BIG-IP Virtual Environment (VE) on Azure](../active-directory/manage-apps/f5-bigip-deployment-guide.md)
3231

3332
- Any of the following F5 BIG-IP license SKUs
3433

@@ -40,9 +39,9 @@ To get started, you'll need:
4039

4140
- 90-day BIG-IP full feature [trial license](https://www.f5.com/trial/big-ip-trial.php)
4241

43-
- An existing header-based web application or [setup an IIS app](https://docs.microsoft.com/previous-versions/iis/6.0-sdk/ms525396(v=vs.90)) for testing
42+
- An existing header-based web application or [setup an IIS app](/previous-versions/iis/6.0-sdk/ms525396(v=vs.90)) for testing
4443

45-
- [SSL certificate](https://docs.microsoft.com/azure/active-directory/manage-apps/f5-bigip-deployment-guide#ssl-profile) for publishing services over HTTPS or use default while testing.
44+
- [SSL certificate](../active-directory/manage-apps/f5-bigip-deployment-guide.md#ssl-profile) for publishing services over HTTPS or use default while testing.
4645

4746
## Scenario description
4847

@@ -81,7 +80,7 @@ For increased security, organizations using this pattern could also consider blo
8180

8281
## Azure AD B2C Configuration
8382

84-
Enabling a BIG-IP with Azure AD B2C authentication requires an Azure AD B2C tenant with a suitable user flow or custom policy. [Set up an Azure AD B2C user flow](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-create-user-flows).
83+
Enabling a BIG-IP with Azure AD B2C authentication requires an Azure AD B2C tenant with a suitable user flow or custom policy. [Set up an Azure AD B2C user flow](tutorial-create-user-flows.md).
8584

8685
### Create custom attributes
8786

@@ -108,7 +107,7 @@ displays them all.
108107

109108
4. Select **Application claims** and add both custom attributes plus also the **Display Name**. These are the attributes that will be sent to the BIG-IP.
110109

111-
You can use the [Run user flow](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-create-user-flows) feature
110+
You can use the [Run user flow](tutorial-create-user-flows.md) feature
112111
in the user flow menu on the left navigation bar to verify it prompts for all defined attributes.
113112

114113
### Azure AD B2C federation
@@ -132,7 +131,7 @@ federating, so the BIG-IP must be registered in the Azure AD B2C tenant as an OI
132131

133132
8. Note down the client secret, you'll need this later for configuring the BIG-IP.
134133

135-
The redirect URI is the BIG-IP endpoint to which a user is sent back to by the authorization server - Azure AD B2C, after authenticating. [Register an application](https://docs.microsoft.com/azure/active-directory-b2c/tutorial-register-applications) for Azure AD B2C.
134+
The redirect URI is the BIG-IP endpoint to which a user is sent back to by the authorization server - Azure AD B2C, after authenticating. [Register an application](tutorial-register-applications.md) for Azure AD B2C.
136135

137136
## BIG-IP configuration
138137

@@ -328,7 +327,7 @@ Here, we'll configure Azure AD B2C as the OAuth2 IdP. You’ll notice that the G
328327
## Related information
329328

330329
The last step provides an overview of configurations. Hitting Deploy will commit your settings and create all necessary BIG-IP and APM objects to enable secure hybrid access to the application.
331-
The application should also be visible as a target resource in CA. See the [guidance for building CA policies for Azure AD B2C](https://docs.microsoft.com/azure/active-directory-b2c/conditional-access-identity-protection-overview).
330+
The application should also be visible as a target resource in CA. See the [guidance for building CA policies for Azure AD B2C](conditional-access-identity-protection-overview.md).
332331
For increased security, organizations using this pattern could also consider blocking all direct access to the application, thereby forcing a strict path through the BIG-IP.
333332

334333
## Next steps
@@ -345,14 +344,14 @@ You will then be redirected to sign up and authenticate against your Azure AD B2
345344

346345
**Single Log-Out (SLO)**
347346

348-
Azure AD B2C fully supports IdP and application sign out through various [mechanisms](https://docs.microsoft.com/azure/active-directory-b2c/session-behavior?pivots=b2c-custom-policy#single-sign-out).
347+
Azure AD B2C fully supports IdP and application sign out through various [mechanisms](session-behavior.md?pivots=b2c-custom-policy#single-sign-out).
349348
Having your application’s sign-out function call the Azure AD B2C log-out endpoint would be one way of achieving SLO. That way we can be sure Azure AD B2C issues a final redirect to the BIG-IP to ensure the APM session between the user and the application has also been terminated.
350349
Another alternative is to have the BIG-IP listen for the request when selecting the applications sign out button, and upon detecting the request it makes a simultaneous call to the Azure AD B2C logoff endpoint. This approach would avoid having to make any changes to the application itself yet achieves SLO. More details on using BIG-IP iRules to implement this are [available](https://support.f5.com/csp/article/K42052145).
351350
In either case your Azure AD B2C tenant would need to know the APM’s logout endpoint.
352351

353352
1. Navigate to **Manage** > **Manifest** in your Azure AD B2C portal and locate the logoutUrl property. It should read null.
354353

355-
2. Add the APM’s post logout URI: https://<mysite.com>/my.logout.php3, where <mysite.com> is the BIG-IP FQDN for your own header-based application.
354+
2. Add the APM’s post logout URI: `https://<mysite.com>/my.logout.php3`, where `<mysite.com>` is the BIG-IP FQDN for your own header-based application.
356355

357356
**Optimized login flow**
358357

articles/active-directory/external-identities/one-time-passcode.md

Lines changed: 53 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ services: active-directory
77
ms.service: active-directory
88
ms.subservice: B2B
99
ms.topic: how-to
10-
ms.date: 10/13/2021
10+
ms.date: 10/15/2021
1111

1212
ms.author: mimart
1313
author: msmimart
@@ -148,3 +148,55 @@ To enable the email one-time passcode feature in Azure US Government cloud:
148148
5. Select **Save**.
149149

150150
For more information about current limitations, see [Azure US Government clouds](current-limitations.md#azure-us-government-clouds).
151+
152+
## Frequently asked questions
153+
154+
**Why do I still see “Automatically enable email one-time passcode for guests starting October 2021” selected in my email one-time passcode settings?**
155+
156+
Due to our deployment schedules, we will start rolling out the change to enable email one-time passcode by default globally on November 1, 2021. Until then, you might still see “Automatically enable email one-time passcode for guests starting October 2021” selected in my email one-time passcode settings.
157+
158+
**What is the user experience for guests during global rollout?**
159+
160+
During global rollout, the user experience for guests depends on your email one-time passcode configuration and your guest's scenario.
161+
162+
Before the change is rolled out to your region, guests will see the following behavior.
163+
164+
- With email one-time passcode enabled:
165+
166+
- If a guest has an existing unmanaged Azure AD account, they'll continue signing in with their unmanaged Azure AD account.
167+
- If a guest previously redeemed an invitation to your tenant using an unmanaged Azure AD account, and you reset their redemption status and reinvite them, they'll continue signing in with their unmanaged Azure AD account.
168+
- If a guest doesn't have an existing unmanaged Azure AD account, they'll redeem using email one-time passcode authentication.
169+
170+
- With email one-time passcode disabled:
171+
172+
- If a guest has an existing unmanaged Azure AD account, they'll continue signing in with their unmanaged Azure AD account.
173+
- If a guest previously redeemed an invitation to your tenant using an unmanaged Azure AD account, and you reset their redemption status and reinvite them, they'll continue signing in with their unmanaged Azure AD account.
174+
- If a guest doesn't have an existing unmanaged Azure AD account, they'll redeem using an email one-time passcode link, but they may get a sign-in error if they're not added to the Azure portal in advance.
175+
176+
After the change is rolled out to your region, guests will see the following behavior.
177+
178+
- With email one-time passcode enabled:
179+
180+
- If a guest has an existing unmanaged Azure AD account, they'll use email one-time passcode to redeem and sign in going forward.
181+
- If a guest previously redeemed an invitation to your tenant using an unmanaged Azure AD account, and you reset their redemption status and reinvite them, they'll use email one-time passcode to redeem and sign in going forward.
182+
- If a guest doesn't have an unmanaged Azure AD account, they'll use email one-time passcode to redeem and sign in going forward.
183+
184+
- With email one-time passcode disabled:
185+
186+
- If a guest has an existing unmanaged Azure AD account, they'll use a Microsoft account to redeem. They'll end up with two accounts (the unmanaged Azure AD account and the Microsoft account). To prevent this from happening, we strongly encourage you to enable email one-time passcode.
187+
- If a guest previously redeemed an invitation to your tenant using an unmanaged Azure AD account, and you reset their redemption status and reinvite them, they'll use a Microsoft account to redeem. They'll end up with two accounts (the unmanaged Azure AD account and the Microsoft account). To prevent this from happening, we strongly encourage you to enable email one-time passcode.
188+
- If a guest doesn't have an unmanaged Azure AD account, they'll use a Microsoft account to redeem and sign in going forward.
189+
190+
For more information about the different redemption pathways, see [B2B collaboration invitation redemption](redemption-experience.md).
191+
192+
**Does this mean the “No account? Create one!” option for self-service sign-up is going away?**
193+
194+
It’s easy to get [self-service sign-up in the context of External Identities](self-service-sign-up-overview.md) confused with self-service sign-up for email-verified users, but they are two different features. The feature that's going away is [self-service sign-up with email-verified users](../enterprise-users/directory-self-service-signup.md), which results in your guests creating an unmanaged Azure AD account. However, self-service sign-up for External Identities will continue to be available, which results in your guests signing up to your organization with a [variety of identity providers](identity-providers.md). 
195+
196+
**What does Microsoft recommend we do with existing Microsoft accounts (MSA)?**
197+
198+
When we support the ability to disable Microsoft Account in the Identity providers settings (not available today), we strongly recommend you disable Microsoft Account and enable email one-time passcode. Then you should reset the redemption status of existing guests with Microsoft accounts so that they can re-redeem using email one-time passcode authentication and use email one-time passcode to sign in going forward.
199+
200+
**Does this change include SharePoint and OneDrive integration with Azure AD B2B?**
201+
202+
No, the global rollout of the change to enable email one-time passcode by default that begins on November 1, 2021 doesn't include SharePoint and OneDrive integration with Azure AD B2B. To learn how to enable integration so that collaboration on SharePoint and OneDrive uses B2B capabilities, or how to disable this integration, see [SharePoint and OneDrive Integration with Azure AD B2B](/sharepoint/sharepoint-azureb2b-integration).

articles/active-directory/managed-identities-azure-resources/tutorial-vm-managed-identities-cosmos.md

Lines changed: 5 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,16 @@
11
---
22
title: Use managed identities from a virtual machine to access Cosmos DB | Microsoft Docs
33
description: Learn how to use managed identities with Windows VMs using the Azure portal, CLI, PowerShell, Azure Resource Manager template
4-
services: active-directory
54
author: barclayn
65
manager: karenh444
7-
editor: ''
8-
96
ms.service: active-directory
107
ms.subservice: msi
118
ms.workload: integration
129
ms.topic: tutorial
1310
ms.date: 10/14/2021
1411
ms.author: barclayn
1512
ms.custom: ep-miar
16-
1713
#Customer intent: As an administrator I want to know how to access Cosmos DB from a virtual machine using a managed identity
18-
1914
---
2015

2116
# How to use managed identities to connect to Cosmos DB from an Azure virtual machine
@@ -297,7 +292,7 @@ az cosmosdb sql role assignment create --account-name $accountName --resource-gr
297292

298293
## Access data
299294

300-
Getting access to Cosmos using managed identities may be achieved using the Azure.identity library to enable authentication in your application. You can call [ManagedIdentityCredential](/dotnet/api/azure.identity.managedidentitycredential?view=azure-dotnet) directly or use [DefaultAzureCredential](/dotnet/api/azure.identity.defaultazurecredential?view=azure-dotnet).
295+
Getting access to Cosmos using managed identities may be achieved using the Azure.identity library to enable authentication in your application. You can call [ManagedIdentityCredential](/dotnet/api/azure.identity.managedidentitycredential) directly or use [DefaultAzureCredential](/dotnet/api/azure.identity.defaultazurecredential).
301296

302297
The ManagedIdentityCredential class attempts to authentication using a managed identity assigned to the deployment environment. The [DefaultAzureCredential](/dotnet/api/overview/azure/identity-readme) class goes through different authentication options in order. The second authentication option that DefaultAzureCredential attempts is Managed identities.
303298

@@ -387,7 +382,7 @@ Initialize your Cosmos DB client:
387382
CosmosClient client = new CosmosClient("<account-endpoint>", new ManagedIdentityCredential());
388383
```
389384

390-
Then [read and write data](https://docs.microsoft.com/azure/cosmos-db/sql-api-dotnet-v3sdk-samples).
385+
Then [read and write data](../../cosmos-db/sql/sql-api-dotnet-v3sdk-samples.md).
391386

392387
### Java
393388

@@ -397,7 +392,7 @@ Initialize your Cosmos DB client:
397392
CosmosAsyncClient Client = new CosmosClientBuilder().endpoint("<account-endpoint>") .credential(new ManagedIdentityCredential()) .build();
398393
```
399394

400-
Then read and write data as described in [these samples](https://docs.microsoft.com/azure/cosmos-db/sql-api-java-sdk-samples)
395+
Then read and write data as described in [these samples](../../cosmos-db/sql/sql-api-java-sdk-samples.md)
401396

402397
### JavaScript
403398

@@ -407,7 +402,7 @@ Initialize your Cosmos DB client:
407402
const client = new CosmosClient({ "<account-endpoint>", aadCredentials: new ManagedIdentityCredential() });
408403
```
409404

410-
Then read and write data as described in [these samples](https://docs.microsoft.com/azure/cosmos-db/sql-api-nodejs-samples)
405+
Then read and write data as described in [these samples](../../cosmos-db/sql/sql-api-nodejs-samples.md)
411406

412407
## Clean up steps
413408

@@ -453,4 +448,4 @@ Learn more about managed identities for Azure resources:
453448
Learn more about Azure Cosmos
454449

455450
- [Azure Cosmos DB resource model](../../cosmos-db/account-databases-containers-items.md)
456-
- [Tutorial: Build a .NET console app to manage data in Azure Cosmos DB SQL API account](../../cosmos-db/sql/sql-api-get-started.md)
451+
- [Tutorial: Build a .NET console app to manage data in Azure Cosmos DB SQL API account](../../cosmos-db/sql/sql-api-get-started.md)

0 commit comments

Comments
 (0)