You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/active-directory-schema-extensions.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -59,10 +59,11 @@ For example, here is a claims-mapping policy to emit a single claim from a direc
59
59
60
60
Where *xxxxxxx* is the appID (or Client ID) of the application that the extension was registered with.
61
61
62
+
> [!WARNING]
63
+
> When you define a claims mapping policy for a directory extension attribute, use the `ExtensionID` property instead of the `ID` property within the body of the `ClaimsSchema` array, as shown in the example above.
64
+
62
65
> [!TIP]
63
66
> Case consistency is important when setting directory extension attributes on objects. Extension attribute names aren't cases sensitive when being set up, but they are case sensitive when being read from the directory by the token service. If an extension attribute is set on a user object with the name "LegacyId" and on another user object with the name "legacyid", when the attribute is mapped to a claim using the name "LegacyId" the data will be successfully retrieved and the claim included in the token for the first user but not the second.
64
-
>
65
-
> The "Id" parameter in the claims schema used for built-in directory attributes is "ExtensionID" for directory extension attributes.
66
67
67
68
## Next steps
68
69
- Learn how to [add custom or additional claims to the SAML 2.0 and JSON Web Tokens (JWT) tokens](active-directory-optional-claims.md).
Copy file name to clipboardExpand all lines: articles/active-directory/develop/reply-url.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,6 +45,8 @@ This table shows the maximum number of redirect URIs you can add to an app regis
45
45
| Microsoft work or school accounts in any organization's Azure Active Directory (Azure AD) tenant | 256 |`signInAudience` field in the application manifest is set to either *AzureADMyOrg* or *AzureADMultipleOrgs*|
46
46
| Personal Microsoft accounts and work and school accounts | 100 |`signInAudience` field in the application manifest is set to *AzureADandPersonalMicrosoftAccount*|
47
47
48
+
The maximum number of redirect URIS can't be raised for [security reasons](#restrictions-on-wildcards-in-redirect-uris). If your scenario requires more redirect URIs than the maximum limit allowed, consider the following [state parameter approach](#use-a-state-parameter) as the solution.
49
+
48
50
## Maximum URI length
49
51
50
52
You can use a maximum of 256 characters for each redirect URI you add to an app registration.
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/meta-work-accounts-tutorial.md
+32-32Lines changed: 32 additions & 32 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Facebook Work Accounts | Microsoft Docs'
3
-
description: Learn how to configure single sign-on between Azure Active Directory and Facebook Work Accounts.
2
+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Meta Work Accounts | Microsoft Docs'
3
+
description: Learn how to configure single sign-on between Azure Active Directory and Meta Work Accounts.
4
4
services: active-directory
5
5
author: jeevansd
6
6
manager: CelesteDG
@@ -14,56 +14,56 @@ ms.author: jeedes
14
14
15
15
---
16
16
17
-
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Facebook Work Accounts
17
+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Meta Work Accounts
18
18
19
-
In this tutorial, you'll learn how to integrate Facebook Work Accounts with Azure Active Directory (Azure AD). When you integrate Facebook Work Accounts with Azure AD, you can:
19
+
In this tutorial, you'll learn how to integrate Meta Work Accounts with Azure Active Directory (Azure AD). When you integrate Meta Work Accounts with Azure AD, you can:
20
20
21
-
* Control in Azure AD who has access to Facebook Work Accounts.
22
-
* Enable your users to be automatically signed-in to Facebook Work Accounts with their Azure AD accounts.
21
+
* Control in Azure AD who has access to Meta Work Accounts.
22
+
* Enable your users to be automatically signed-in to Meta Work Accounts with their Azure AD accounts.
23
23
* Manage your accounts in one central location - the Azure portal.
24
24
25
25
## Prerequisites
26
26
27
27
To get started, you need the following items:
28
28
29
29
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30
-
*Facebook Work Accounts single sign-on (SSO) enabled subscription.
30
+
*Meta Work Accounts single sign-on (SSO) enabled subscription.
31
31
32
32
## Scenario description
33
33
34
34
In this tutorial, you configure and test Azure AD SSO in a test environment.
35
35
36
-
*Facebook Work Accounts supports **SP and IDP** initiated SSO.
36
+
*Meta Work Accounts supports **SP and IDP** initiated SSO.
37
37
38
-
## Add Facebook Work Accounts from the gallery
38
+
## Add Meta Work Accounts from the gallery
39
39
40
-
To configure the integration of Facebook Work Accounts into Azure AD, you need to add Facebook Work Accounts from the gallery to your list of managed SaaS apps.
40
+
To configure the integration of Meta Work Accounts into Azure AD, you need to add Meta Work Accounts from the gallery to your list of managed SaaS apps.
41
41
42
42
1. Sign in to the Azure portal using either a work or school account, or a personal Microsoft account.
43
43
1. On the left navigation pane, select the **Azure Active Directory** service.
44
44
1. Navigate to **Enterprise Applications** and then select **All Applications**.
45
45
1. To add new application, select **New application**.
46
-
1. In the **Add from the gallery** section, type **Facebook Work Accounts** in the search box.
47
-
1. Select **Facebook Work Accounts** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
46
+
1. In the **Add from the gallery** section, type **Meta Work Accounts** in the search box.
47
+
1. Select **Meta Work Accounts** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
48
48
49
-
## Configure and test Azure AD SSO for Facebook Work Accounts
49
+
## Configure and test Azure AD SSO for Meta Work Accounts
50
50
51
-
Configure and test Azure AD SSO with Facebook Work Accounts using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Facebook Work Accounts.
51
+
Configure and test Azure AD SSO with Meta Work Accounts using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Meta Work Accounts.
52
52
53
-
To configure and test Azure AD SSO with Facebook Work Accounts, perform the following steps:
53
+
To configure and test Azure AD SSO with Meta Work Accounts, perform the following steps:
54
54
55
55
1.**[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
56
56
1.**[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
57
57
1.**[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
58
-
1.**[Configure Facebook Work Accounts SSO](#configure-facebook-work-accounts-sso)** - to configure the single sign-on settings on application side.
59
-
1.**[Create Facebook Work Accounts test user](#create-facebook-work-accounts-test-user)** - to have a counterpart of B.Simon in Facebook Work Accounts that is linked to the Azure AD representation of user.
58
+
1.**[Configure Meta Work Accounts SSO](#configure-meta-work-accounts-sso)** - to configure the single sign-on settings on application side.
59
+
1.**[Create Meta Work Accounts test user](#create-meta-work-accounts-test-user)** - to have a counterpart of B.Simon in Meta Work Accounts that is linked to the Azure AD representation of user.
60
60
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
61
61
62
62
## Configure Azure AD SSO
63
63
64
64
Follow these steps to enable Azure AD SSO in the Azure portal.
65
65
66
-
1. In the Azure portal, on the **Facebook Work Accounts** application integration page, find the **Manage** section and select **single sign-on**.
66
+
1. In the Azure portal, on the **Meta Work Accounts** application integration page, find the **Manage** section and select **single sign-on**.
67
67
1. On the **Select a single sign-on method** page, select **SAML**.
68
68
1. On the **Set up single sign-on with SAML** page, click the pencil icon for **Basic SAML Configuration** to edit the settings.
69
69
@@ -89,7 +89,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
@@ -107,29 +107,29 @@ In this section, you'll create a test user in the Azure portal called B.Simon.
107
107
108
108
### Assign the Azure AD test user
109
109
110
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Facebook Work Accounts.
110
+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Meta Work Accounts.
111
111
112
112
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
113
-
1. In the applications list, select **Facebook Work Accounts**.
113
+
1. In the applications list, select **Meta Work Accounts**.
114
114
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
115
115
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
116
116
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
117
117
1. If you are expecting a role to be assigned to the users, you can select it from the **Select a role** dropdown. If no role has been set up for this app, you see "Default Access" role selected.
118
118
1. In the **Add Assignment** dialog, click the **Assign** button.
119
119
120
-
## Configure Facebook Work Accounts SSO
120
+
## Configure Meta Work Accounts SSO
121
121
122
-
1. Log in to your Facebook Work Accounts company site as an administrator.
122
+
1. Log in to your Meta Work Accounts company site as an administrator.
123
123
124
124
1. Go to **Security** > **Single Sign-On**.
125
125
126
126
1. Enable **Single-sign on(SSO)** checkbox and click **+Add new SSO Provider**.
127
127
128
-

128
+

129
129
130
130
1. On the **Single Sign-On (SSO) Setup** page, perform the following steps:
131
131
132
-

132
+

133
133
134
134
1. Enter a valid **Name of the SSO Provider**.
135
135
@@ -149,26 +149,26 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
149
149
150
150
1. Click **Save Changes**.
151
151
152
-
### Create Facebook Work Accounts test user
152
+
### Create Meta Work Accounts test user
153
153
154
-
In this section, you create a user called Britta Simon in Facebook Work Accounts. Work with the [Work Accounts team](https://www.workplace.com/help/work) to add the users in the Facebook Work Accounts platform. Users must be created and activated before you use single sign-on.
154
+
In this section, you create a user called Britta Simon in Meta Work Accounts. Work with the [Work Accounts team](https://www.workplace.com/help/work) to add the users in the Meta Work Accounts platform. Users must be created and activated before you use single sign-on.
155
155
156
156
## Test SSO
157
157
158
158
In this section, you test your Azure AD single sign-on configuration with following options.
159
159
160
160
#### SP initiated:
161
161
162
-
* Click on **Test this application** in Azure portal. This will redirect to Facebook Work Accounts Sign on URL where you can initiate the login flow.
162
+
* Click on **Test this application** in Azure portal. This will redirect to Meta Work Accounts Sign on URL where you can initiate the login flow.
163
163
164
-
* Go to Facebook Work Accounts Sign-on URL directly and initiate the login flow from there.
164
+
* Go to Meta Work Accounts Sign-on URL directly and initiate the login flow from there.
165
165
166
166
#### IDP initiated:
167
167
168
-
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Facebook Work Accounts for which you set up the SSO.
168
+
* Click on **Test this application** in Azure portal and you should be automatically signed in to the Meta Work Accounts for which you set up the SSO.
169
169
170
-
You can also use Microsoft My Apps to test the application in any mode. When you click the Facebook Work Accounts tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Facebook Work Accounts for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
170
+
You can also use Microsoft My Apps to test the application in any mode. When you click the Meta Work Accounts tile in the My Apps, if configured in SP mode you would be redirected to the application sign on page for initiating the login flow and if configured in IDP mode, you should be automatically signed in to the Meta Work Accounts for which you set up the SSO. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
171
171
172
172
## Next steps
173
173
174
-
Once you configure Facebook Work Accounts you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
174
+
Once you configure Meta Work Accounts you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-aad).
| documentId | string | Generated by FRS, identifies the document for which the token is being generated. |
37
+
| documentId | string | Generated by Azure Fluid Relay (AFR) service. Identifies the document for which the token is being generated. |
38
38
| scope | string[]| Identifies the permissions required by the client on the document or summary. For every scope, you can define the permissions you want to give to the client. |
39
39
| tenantId | string | Identifies the tenant. |
40
40
| user | JSON |*Optional*`{ displayName: <display_name>, id: <user_id>, name: <user_name>, }` Identifies users of your application. This is sent back to your application by Alfred, the ordering service. It can be used by your application to identify your users from the response it gets from Alfred. Azure Fluid Relay doesn't validate this information. |
Testing and automation are crucial to maintaining the quality and longevity of your code. Internally, Fluid uses a range of unit and integration tests powered by [Mocha](https://mochajs.org/), [Jest](https://jestjs.io/), [Puppeteer](https://github.com/puppeteer/puppeteer), and [Webpack](https://webpack.js.org/).
16
16
17
-
You can run tests using the local **@fluidframework/azure-local-service** or using a test tenant in Azure Fluid Relay service. **AzureClient** can be configured to connect to both a remote service and a local service, which enables you to use a single client type between tests against live and local service instances. The only difference is the configuration used to create the client.
17
+
You can run tests using the local [@fluidframework/azure-local-service](https://www.npmjs.com/package/@fluidframework/azure-local-service) or using a test tenant in Azure Fluid Relay service. [AzureClient](https://fluidframework.com/docs/apis/azure-client/azureclient) can be configured to connect to both a remote service and a local service, which enables you to use a single client type between tests against live and local service instances. The only difference is the configuration used to create the client.
When you create a document in Azure Fluid Relay, the JWT provided by the `ITokenProvider` for the creation request can only be used once. After creating a document, the client must generate a new JWT that contains the document ID provided by the service at creation time. If an application has an authorization service that manages document access control, it will need to know who created a document with a given ID in order to authorize the generation of a new JWT for access to that document.
15
+
When you create a document in Azure Fluid Relay, the JWT provided by the [ITokenProvider](https://fluidframework.com/docs/apis/azure-client/itokenprovider/) for the creation request can only be used once. After creating a document, the client must generate a new JWT that contains the document ID provided by the service at creation time. If an application has an authorization service that manages document access control, it will need to know who created a document with a given ID in order to authorize the generation of a new JWT for access to that document.
16
16
17
17
## Inform an Authorization Service when a document is Created
18
18
19
-
An application can tie into the document creation lifecycle by implementing a public `documentPostCreateCallback()` property in its `TokenProvider`. This callback will be triggered directly after creating the document, before a client requests the new JWT it needs to gain read/write permissions to the document that was created.
19
+
An application can tie into the document creation lifecycle by implementing a public [documentPostCreateCallback()](https://fluidframework.com/docs/apis/azure-client/itokenprovider#documentpostcreatecallback-MethodSignature) method in its `TokenProvider`. This callback will be triggered directly after creating the document, before a client requests the new JWT it needs to gain read/write permissions to the document that was created.
20
20
21
21
The `documentPostCreateCallback()` receives two parameters: 1) the ID of the document that was created and 2) a JWT signed by the service with no permission scopes. The authorization service can verify the given JWT and use the information in the JWT to grant the correct user permissions for the newly created document.
0 commit comments