Skip to content

Commit 5cd436d

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into rolyon-aadroles-admin-units-scope-sharepoint-teams-update
2 parents f49c1aa + 197ac5b commit 5cd436d

File tree

324 files changed

+3004
-1898
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

324 files changed

+3004
-1898
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43933,6 +43933,11 @@
4393343933
"source_path_from_root": "/articles/governance/policy/how-to/guest-configuration-create-group-policy.md",
4393443934
"redirect_url": "/azure/governance/policy/how-to/guest-configuration-create",
4393543935
"redirect_document_id": false
43936+
},
43937+
{
43938+
"source_path_from_root": "/articles/virtual-desktop/compare-virtual-desktop-windows-365.md",
43939+
"redirect_url": "/azure/virtual-desktop/overview",
43940+
"redirect_document_id": false
4393643941
}
4393743942
]
4393843943
}

articles/active-directory-b2c/claimsschema.md

Lines changed: 4 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 02/16/2022
11+
ms.date: 03/06/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
ms.custom: "b2c-support"
@@ -127,7 +127,7 @@ The **Mask** element contains the following attributes:
127127
| `Type` | Yes | The type of the claim mask. Possible values: `Simple` or `Regex`. The `Simple` value indicates that a simple text mask is applied to the leading portion of a string claim. The `Regex` value indicates that a regular expression is applied to the string claim as whole. If the `Regex` value is specified, an optional attribute must also be defined with the regular expression to use. |
128128
| `Regex` | No | If **`Type`** is set to `Regex`, specify the regular expression to use.
129129

130-
The following example configures a **PhoneNumber** claim with the `Simple` mask:
130+
The following example configures a **PhoneNumber** claim with the `Simple` mask. For more samples, check out the [Claim simple mask live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims#simple-mask).
131131

132132
```xml
133133
<ClaimType Id="PhoneNumber">
@@ -142,7 +142,7 @@ The Identity Experience Framework renders the phone number while hiding the firs
142142

143143
![Phone number claim shown in browser with first six digits masked by Xs](./media/claimsschema/mask.png)
144144

145-
The following example configures a **AlternateEmail** claim with the `Regex` mask:
145+
The following example configures a **AlternateEmail** claim with the `Regex` mask. For more samples, check out the [Regex mask live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims#regex-mask).
146146

147147
```xml
148148
<ClaimType Id="AlternateEmail">
@@ -157,7 +157,6 @@ The Identity Experience Framework renders only the first letter of the email add
157157

158158
![Email claim shown in browser with characters masked by asterisks](./media/claimsschema/mask-regex.png)
159159

160-
161160
### Restriction
162161

163162
The **Restriction** element may contain the following attribute:
@@ -185,7 +184,7 @@ The **Enumeration** element contains the following attributes:
185184
|Value | Yes | The claim value that is associated with selecting this option. |
186185
| SelectByDefault | No | Indicates whether or not this option should be selected by default in the UI. Possible values: True or False. |
187186

188-
The following example configures a **city** dropdown list claim with a default value set to `New York`:
187+
The following example configures a **city** dropdown list claim with a default value set to `New York`. For more samples, check out the [Claim restriction enumeration live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims#restriction-enumeration).
189188

190189
```xml
191190
<ClaimType Id="city">
@@ -390,7 +389,6 @@ The **Readonly** user input type is used to provide a readonly field to display
390389
</ClaimType>
391390
```
392391

393-
394392
#### Paragraph
395393

396394
The **Paragraph** user input type is used to provide a field that shows text only in a paragraph tag. For example, &lt;p&gt;text&lt;/p&gt;. A **Paragraph** user input type `OutputClaim` of self-asserted technical profile, must set the `Required` attribute `false` (default).
@@ -404,10 +402,5 @@ The **Paragraph** user input type is used to provide a field that shows text onl
404402
<AdminHelpText>A claim responsible for holding response messages to send to the relying party</AdminHelpText>
405403
<UserHelpText>A claim responsible for holding response messages to send to the relying party</UserHelpText>
406404
<UserInputType>Paragraph</UserInputType>
407-
<Restriction>
408-
<Enumeration Text="B2C_V1_90001" Value="You cannot sign in because you are a minor" />
409-
<Enumeration Text="B2C_V1_90002" Value="This action can only be performed by gold members" />
410-
<Enumeration Text="B2C_V1_90003" Value="You have not been enabled for this operation" />
411-
</Restriction>
412405
</ClaimType>
413406
```

articles/active-directory-b2c/configure-authentication-sample-web-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ Under the project root folder, open the *appsettings.json* file. This file conta
113113
|---------|---------|---------|
114114
|AzureAdB2C|Instance| The first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name) (for example, `https://contoso.b2clogin.com`).|
115115
|AzureAdB2C|Domain| Your Azure AD B2C tenant full [tenant name](tenant-management.md#get-your-tenant-name) (for example, `contoso.onmicrosoft.com`).|
116-
|AzureAdB2C|ClientId| The web API application ID from [step 2](#step-2-register-a-web-application).|
116+
|AzureAdB2C|ClientId| The Web App Application (client) ID from [step 2](#step-2-register-a-web-application).|
117117
|AzureAdB2C|SignUpSignInPolicyId|The user flows or custom policy you created in [step 1](#step-1-configure-your-user-flow).|
118118

119119
Your final configuration file should look like the following JSON:

articles/active-directory-b2c/localization.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: reference
10-
ms.date: 01/21/2022
10+
ms.date: 03/06/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
@@ -110,24 +110,26 @@ The **Item** element contains the following attributes:
110110
| Value | Yes | The string claim value associated with selecting this option. |
111111
| SelectByDefault | No | Indicates whether or not this option should be selected by default in the UI. Possible values: True or False. |
112112

113-
The following example shows the use of the **LocalizedCollections** element. It contains two **LocalizedCollection** elements, one for English and another one for Spanish. Both set the **Restriction** collection of the claim `Gender` with a list of items for English and Spanish.
113+
The following example shows the use of the **LocalizedCollections** element. It contains two **LocalizedCollection** elements, one for English and another one for Spanish. Both set the **Restriction** collection of the claim `Gender` with a list of items for English and Spanish. For more samples, check out the [Claim restriction enumeration live demo](https://github.com/azure-ad-b2c/unit-tests/tree/main/claims#restriction-enumeration).
114114

115115
```xml
116116
<LocalizedResources Id="api.selfasserted.en">
117-
<LocalizedCollections>
118-
<LocalizedCollection ElementType="ClaimType" ElementId="Gender" TargetCollection="Restriction">
117+
<LocalizedCollections>
118+
<LocalizedCollection ElementType="ClaimType" ElementId="Gender" TargetCollection="Restriction">
119119
<Item Text="Female" Value="F" />
120120
<Item Text="Male" Value="M" />
121121
</LocalizedCollection>
122-
</LocalizedCollections>
122+
</LocalizedCollections>
123+
</LocalizedResources>
123124

124125
<LocalizedResources Id="api.selfasserted.es">
125126
<LocalizedCollections>
126127
<LocalizedCollection ElementType="ClaimType" ElementId="Gender" TargetCollection="Restriction">
127128
<Item Text="Femenino" Value="F" />
128129
<Item Text="Masculino" Value="M" />
129130
</LocalizedCollection>
130-
</LocalizedCollections>
131+
</LocalizedCollections>
132+
</LocalizedResources>
131133
```
132134

133135
### LocalizedStrings

articles/active-directory-b2c/protocols-overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,8 @@ https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/oauth2/v2.0/authorize
3434
https://{tenant}.b2clogin.com/{tenant}.onmicrosoft.com/oauth2/v2.0/token
3535
```
3636

37+
If you're using a [custom domain](custom-domain.md), replace `{tenant}.b2clogin.com` with the custom domain, such as `contoso.com`, in the endpoints.
38+
3739
In nearly all OAuth and OpenID Connect flows, four parties are involved in the exchange:
3840

3941

Loading

articles/active-directory/conditional-access/workload-identity.md

Lines changed: 18 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 02/23/2022
9+
ms.date: 03/04/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -56,49 +56,25 @@ Create a location based Conditional Access policy that applies to service princi
5656

5757
### Create a risk-based Conditional Access policy
5858

59-
Use this sample JSON for a risk-based policy using the [Microsoft Graph beta endpoint](/graph/api/resources/conditionalaccesspolicy?view=graph-rest-1.0&preserve-view=true).
59+
Create a location based Conditional Access policy that applies to service principals.
6060

61-
> [!NOTE]
62-
> Report-only mode doesn't report account risk on a risky workload identity.
61+
:::image type="content" source="media/workload-identity/conditional-access-workload-identity-risk-policy.png" alt-text="Creating a Conditional Access policy with a workload identity and risk as a condition." lightbox="media/workload-identity/conditional-access-workload-identity-risk-policy.png":::
6362

64-
```json
65-
{
66-
"displayName": "Name",
67-
"state": "enabled OR disabled",
68-
"conditions": {
69-
"applications": {
70-
"includeApplications": [
71-
"All"
72-
],
73-
"excludeApplications": [],
74-
"includeUserActions": [],
75-
"includeAuthenticationContextClassReferences": [],
76-
"applicationFilter": null
77-
},
78-
"userRiskLevels": [],
79-
"signInRiskLevels": [],
80-
"clientApplications": {
81-
"includeServicePrincipals": [
82-
"ServicePrincipalsInMyTenant"
83-
],
84-
"excludeServicePrincipals": []
85-
},
86-
"servicePrincipalRiskLevels": [
87-
"low",
88-
"medium",
89-
"high"
90-
]
91-
},
92-
"grantControls": {
93-
"operator": "and",
94-
"builtInControls": [
95-
"block"
96-
],
97-
"customAuthenticationFactors": [],
98-
"termsOfUse": []
99-
}
100-
}
101-
```
63+
1. Sign in to the **Azure portal** as a global administrator, security administrator, or Conditional Access administrator.
64+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
65+
1. Select **New policy**.
66+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
67+
1. Under **Assignments**, select **Users or workload identities**.
68+
1. Under **What does this policy apply to?**, select **Workload identities (Preview)**.
69+
1. Under **Include**, choose **Select service principals**, and select the appropriate service principals from the list.
70+
1. Under **Cloud apps or actions**, select **All cloud apps**. The policy will apply only when a service principal requests a token.
71+
1. Under **Conditions** > **Service principal risk (Preview)**
72+
1. Set the **Configure** toggle to **Yes**.
73+
1. Select the levels of risk where you want this policy to trigger.
74+
1. Select **Done**.
75+
1. Under **Grant**, **Block access** is the only available option. Access is blocked when a token request is made from outside the allowed range.
76+
1. Your policy can be saved in **Report-only** mode, allowing administrators to estimate the effects, or policy is enforced by turning policy **On**.
77+
1. Select **Create** to complete your policy.
10278

10379
## Roll back
10480

articles/active-directory/develop/includes/web-app/quickstart-aspnet-core.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Quickstart: ASP.NET Core web app that signs in users and calls Microsoft Graph | Azure"
33
titleSuffix: Microsoft identity platform
4-
description: In this quickstart, you learn how an app leverages Microsoft.Identity.Web to implement Microsoft sign-in in an ASP.NET Core web app using OpenID Connect and calls Microsoft Graph
4+
description: Learn how an ASP.NET Core web app leverages Microsoft.Identity.Web to implement Microsoft sign-in using OpenID Connect and call Microsoft Graph
55
services: active-directory
66
author: jmprieur
77
manager: CelesteDG
@@ -22,7 +22,7 @@ See [How the sample works](#how-the-sample-works) for an illustration.
2222

2323
## Prerequisites
2424

25-
* [Visual Studio 2019](https://visualstudio.microsoft.com/vs/) or [Visual Studio Code](https://code.visualstudio.com/)
25+
* [Visual Studio](https://visualstudio.microsoft.com/vs/) or [Visual Studio Code](https://code.visualstudio.com/)
2626
* [.NET Core SDK 3.1+](https://dotnet.microsoft.com/download)
2727

2828
## Register and download your quickstart application
@@ -46,7 +46,7 @@ See [How the sample works](#how-the-sample-works) for an illustration.
4646

4747
#### Step 2: Download the ASP.NET Core project
4848

49-
[Download the ASP.NET Core solution](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/archive/aspnetcore3-1.zip)
49+
[Download the ASP.NET Core solution](https://github.com/Azure-Samples/active-directory-aspnetcore-webapp-openidconnect-v2/archive/aspnetcore3-1-callsgraph.zip)
5050

5151
[!INCLUDE [active-directory-develop-path-length-tip](../../../../../includes/active-directory-develop-path-length-tip.md)]
5252

@@ -84,6 +84,7 @@ After consenting to the requested permissions, the app displays that you've succ
8484

8585
:::image type="content" source="../../media/quickstart-v2-aspnet-core-webapp-calls-graph/webapp-02-signed-in.png" alt-text="Web browser displaying the running web app and the user signed in":::
8686

87+
8788
## More information
8889

8990
This section gives an overview of the code required to sign in users and call the Microsoft Graph API on their behalf. This overview can be useful to understand how the code works, main arguments, and also if you want to add sign-in to an existing ASP.NET Core application and call Microsoft Graph. It uses [Microsoft.Identity.Web](../../microsoft-identity-web.md), which is a wrapper around [MSAL.NET](../../msal-overview.md).

articles/active-directory/develop/msal-net-web-browsers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ MSAL.NET is able to respond with an HTTP message when a token is received or in
110110
```csharp
111111
var options = new SystemWebViewOptions()
112112
{
113-
HtmlMessageError = "<p> An error occured: {0}. Details {1}</p>",
113+
HtmlMessageError = "<p> An error occurred: {0}. Details {1}</p>",
114114
BrowserRedirectSuccess = new Uri("https://www.microsoft.com");
115115
}
116116

articles/active-directory/develop/reference-claims-mapping-policy-type.md

Lines changed: 28 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.subservice: develop
1010
ms.custom: aaddev
1111
ms.workload: identity
1212
ms.topic: reference
13-
ms.date: 01/04/2022
13+
ms.date: 03/04/2022
1414
ms.author: ryanwi
1515
ms.reviewer: paulgarn, ludwignick, jeedes, luleon
1616
---
@@ -31,6 +31,10 @@ There are certain sets of claims that define how and when they're used in tokens
3131
| Basic claim set | Includes the claims that are emitted by default for tokens (in addition to the core claim set). You can [omit or modify basic claims](active-directory-claims-mapping.md#omit-the-basic-claims-from-tokens) by using the claims mapping policies. |
3232
| Restricted claim set | Can't be modified using policy. The data source cannot be changed, and no transformation is applied when generating these claims. |
3333

34+
This section lists:
35+
- [Table 1: JSON Web Token (JWT) restricted claim set](#table-1-json-web-token-jwt-restricted-claim-set)
36+
- [Table 2: SAML restricted claim set](#table-2-saml-restricted-claim-set)
37+
3438
### Table 1: JSON Web Token (JWT) restricted claim set
3539

3640
> [!NOTE]
@@ -175,6 +179,8 @@ There are certain sets of claims that define how and when they're used in tokens
175179

176180
### Table 2: SAML restricted claim set
177181

182+
The following table lists the SAML claims that are by default in the restricted claim set.
183+
178184
| Claim type (URI) |
179185
| ----- |
180186
|`http://schemas.microsoft.com/2012/01/devicecontext/claims/ismanaged`|
@@ -200,8 +206,27 @@ There are certain sets of claims that define how and when they're used in tokens
200206
|`http://schemas.microsoft.com/ws/2008/06/identity/claims/role`|
201207
|`http://schemas.microsoft.com/ws/2008/06/identity/claims/wids`|
202208
|`http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier`|
203-
204-
209+
| `http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname` |
210+
| `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid` |
211+
| `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarygroupsid` |
212+
| `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/sid` |
213+
| `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishedname` |
214+
| `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn` |
215+
| `http://schemas.microsoft.com/ws/2008/06/identity/claims/role` |
216+
217+
These claims are restricted by default, but are not restricted if you [set the AcceptMappedClaims property](active-directory-claims-mapping.md#update-the-application-manifest) to `true` in your app manifest *or* have a [custom signing key](active-directory-claims-mapping.md#configure-a-custom-signing-key):
218+
219+
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname`
220+
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarysid`
221+
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/primarygroupsid`
222+
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/sid`
223+
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/x500distinguishedname`
224+
225+
These claims are restricted by default, but are not restricted if you have a [custom signing key](active-directory-claims-mapping.md#configure-a-custom-signing-key):
226+
227+
- `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn`
228+
- `http://schemas.microsoft.com/ws/2008/06/identity/claims/role`
229+
205230
## Claims mapping policy properties
206231

207232
To control what claims are emitted and where the data comes from, use the properties of a claims mapping policy. If a policy is not set, the system issues tokens that include the core claim set, the basic claim set, and any [optional claims](active-directory-optional-claims.md) that the application has chosen to receive.

0 commit comments

Comments
 (0)