Skip to content

Commit 6c09416

Browse files
committed
Merge branch 'main' into release-arc-data
2 parents 4feb5a4 + 34f9f8b commit 6c09416

File tree

215 files changed

+3325
-1389
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

215 files changed

+3325
-1389
lines changed

articles/active-directory-b2c/custom-policies-series-hello-world.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,8 +143,10 @@ If you haven't already done so, create the following encryption keys. To automat
143143

144144
```xml
145145
<UserJourney Id="HelloWorldJourney">
146-
<OrchestrationStep Order="1" Type="SendClaims" CpimIssuerTechnicalProfileReferenceId="JwtIssuer" />
147-
</UserJourney>
146+
<OrchestrationSteps>
147+
<OrchestrationStep Order="1" Type="SendClaims" CpimIssuerTechnicalProfileReferenceId="JwtIssuer" />
148+
</OrchestrationSteps>
149+
</UserJourney>
148150
```
149151

150152
We've added a [UserJourney](userjourneys.md). The user journey specifies the business logic the end user goes through as Azure AD B2C processes a request. This user journey has only one step that issues a JTW token with the claims that you'll define in the next step.

articles/active-directory/app-provisioning/plan-auto-user-provisioning.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.topic: conceptual
1010
ms.workload: identity
11-
ms.date: 04/04/2022
11+
ms.date: 04/11/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
1515

1616
# Plan an automatic user provisioning deployment in Azure Active Directory
1717

18-
Many organizations rely on software as a service (SaaS) applications such as ServiceNow, Zscaler, and Slack for end-user productivity. Historically IT staff have relied on manual provisioning methods such as uploading CSV files, or using custom scripts to securely manage user identities in each SaaS application. These processes are error prone, insecure, and hard to manage.
18+
Many organizations rely on software as a service (SaaS) applications such as ServiceNow, Zscaler, and Slack for end-user productivity. Historically IT staff has relied on manual provisioning methods such as uploading CSV files, or using custom scripts to securely manage user identities in each SaaS application. These processes are error prone, insecure, and hard to manage.
1919

2020
Azure Active Directory (Azure AD) automatic user provisioning simplifies this process by securely automating the creation, maintenance, and removal of user identities in SaaS applications based on business rules. This automation allows you to effectively scale your identity management systems on both cloud-only and hybrid environments as you expand their dependency on cloud-based solutions.
2121

@@ -33,7 +33,7 @@ The key benefits of enabling automatic user provisioning are:
3333

3434
* **Manage risk**. You can increase security by automating changes based on employee status or group memberships that define roles and/or access.
3535

36-
* **Address compliance and governance**. Azure AD supports native audit logs for every user provisioning request. Requests are executed in both the source and target systems. This enables you to track who has access to applications from a single screen.
36+
* **Address compliance and governance**. Azure AD supports native audit logs for every user provisioning request. Requests are executed in both the source and target systems. Audit logs let you track who has access to applications from a single screen.
3737

3838
* **Reduce cost**. Automatic user provisioning reduces costs by avoiding inefficiencies and human error associated with manual provisioning. It reduces the need for custom-developed user provisioning solutions, scripts, and audit logs.
3939

@@ -43,7 +43,7 @@ Azure AD provides self-service integration of any application using templates pr
4343

4444
#### Application licensing
4545

46-
You'll need the appropriate licenses for the application(s) you want to automatically provision. Discuss with the application owners whether the users assigned to the application have the proper licenses for their application roles. If Azure AD manages automatic provisioning based on roles, the roles assigned in Azure AD must align to application licenses. Incorrect licenses owned in the application may lead to errors during the provisioning/updating of a user.
46+
You need the appropriate licenses for the application(s) you want to automatically provision. Discuss with the application owners whether the users assigned to the application have the proper licenses for their application roles. If Azure AD manages automatic provisioning based on roles, the roles assigned in Azure AD must align to application licenses. Incorrect licenses owned in the application may lead to errors during the provisioning/updating of a user.
4747

4848
### Terms
4949

@@ -106,7 +106,7 @@ In this example, user creation occurs in Azure AD and the Azure AD provisioning
106106

107107
#### Automatic user provisioning for cloud HR applications
108108

109-
In this example, the users and or groups are created in a cloud HR application like such as Workday and SuccessFactors. The Azure AD provisioning service and Azure AD Connect provisioning agent provisions the user data from the cloud HR app tenant into AD. Once the accounts are updated in AD, it is synced with Azure AD through Azure AD Connect, and the email addresses and username attributes can be written back to the cloud HR app tenant.
109+
In this example, the users and or groups are created in a cloud HR application like such as Workday and SuccessFactors. The Azure AD provisioning service and Azure AD Connect provisioning agent provisions the user data from the cloud HR app tenant into AD. Once the accounts are updated in AD, it's synced with Azure AD through Azure AD Connect, and the email addresses and username attributes can be written back to the cloud HR app tenant.
110110

111111
![Picture 2](./media/plan-auto-user-provisioning/workdayprovisioning.png)
112112

@@ -132,7 +132,7 @@ Communication is critical to the success of any new service. Proactively communi
132132

133133
### Plan a pilot
134134

135-
We recommend that the initial configuration of automatic user provisioning be in a test environment with a small subset of users before scaling it to all users in production. See [best practices](../fundamentals/active-directory-deployment-plans.md#best-practices-for-a-pilot) for running a pilot.
135+
We recommend that the initial configuration of automatic user provisioning is in a test environment with a small subset of users before scaling it to all users in production. See [best practices](../fundamentals/active-directory-deployment-plans.md#best-practices-for-a-pilot) for running a pilot.
136136

137137
#### Best practices for a pilot  
138138

@@ -251,7 +251,7 @@ Choose the steps that align to your solution requirements.
251251

252252
When the Azure AD provisioning service runs for the first time, the initial cycle against the source system and target systems creates a snapshot of all user objects for each target system.
253253

254-
When enabling automatic provisioning for an application, the initial cycle can take anywhere from 20 minutes to several hours. The duration depends on the size of the Azure AD directory and the number of users in scope for provisioning.
254+
When you enable automatic provisioning for an application, the initial cycle takes anywhere from 20 minutes to several hours. The duration depends on the size of the Azure AD directory and the number of users in scope for provisioning.
255255

256256
The provisioning service stores the state of both systems after the initial cycle, improving performance of subsequent incremental cycles.
257257

articles/active-directory/authentication/concept-authentication-passwordless.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ The following considerations apply:
164164

165165
- Administrators can enable passwordless authentication methods for their tenant.
166166

167-
- Administrators can target all users or select users/groups within their tenant for each method.
167+
- Administrators can target all users or select users/Security groups within their tenant for each method.
168168

169169
- Users can register and manage these passwordless authentication methods in their account portal.
170170

articles/active-directory/authentication/concept-mfa-authprovider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: conceptual
9-
ms.date: 01/29/2023
9+
ms.date: 04/10/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -30,7 +30,7 @@ Note the SDK has been deprecated and will only continue to work until November 1
3030

3131
## What is an MFA provider?
3232

33-
There are two types of Auth providers, and the distinction is around how your Azure subscription is charged. The per-authentication option calculates the number of authentications performed against your tenant in a month. This option is best if some users authenticate only occasionally. The per-user option calculates the number of users who are eligible to perform MFA, which is all users in Azure AD, and all enabled users in MFA Server. This option is best if some users have licenses but you need to extend MFA to more users beyond your licensing limits.
33+
There are two types of Auth providers, and the distinction is around how your Azure subscription is charged. The per-authentication option calculates the number of authentications performed against your tenant in a month. This option is best if some accounts authenticate only occasionally. The per-user option calculates the number of accounts that are eligible to perform MFA, which is all accounts in Azure AD, and all enabled accounts in MFA Server. This option is best if some users have licenses but you need to extend MFA to more users beyond your licensing limits.
3434

3535
## Manage your MFA provider
3636

articles/active-directory/authentication/how-to-mfa-number-match.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to use number matching in MFA notifications
44
ms.service: active-directory
55
ms.subservice: authentication
66
ms.topic: conceptual
7-
ms.date: 04/05/2023
7+
ms.date: 04/10/2023
88
ms.author: justinha
99
author: justinha
1010
ms.collection: M365-identity-device-management
@@ -310,9 +310,7 @@ Number match will be enabled for all users of Microsoft Authenticator push notif
310310

311311
Relevant services will begin deploying these changes after May 8, 2023 and users will start to see number match in approval requests. As services deploy, some may see number match while others don't. To ensure consistent behavior for all your users, we highly recommend you use the Azure portal or Graph API to roll out number match for all Microsoft Authenticator users.
312312

313-
### Will the changes after May 8th, 2023, override number matching settings that are configured for a group in the Authentication methods policy?
314-
315-
No, the changes after May 8th won't affect the **Enable and Target** tab for Microsoft Authenticator in the Authentication methods policy. Administrators can continue to target specific users and groups or **All Users** for Microsoft Authenticator **Push** or **Any** authentication mode.
313+
### What happens to number matching settings that are currently configured for a group in the Authentication methods policy after number matching is enabled for Authenticator push notifications after May 8th, 2023?
316314

317315
When Microsoft begins protecting all organizations by enabling number matching after May 8th, 2023, administrators will see the **Require number matching for push notifications** setting on the **Configure** tab of the Microsoft Authenticator policy is set to **Enabled** for **All users** and can't be disabled. In addition, the **Exclude** option for this setting will be removed.
318316

articles/active-directory/authentication/howto-mfa-mfasettings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 02/13/2023
9+
ms.date: 04/10/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -159,7 +159,7 @@ Users can have a combination of up to five OATH hardware tokens or authenticator
159159

160160
If users receive phone calls for MFA prompts, you can configure their experience, such as caller ID or the voice greeting they hear.
161161

162-
In the United States, if you haven't configured MFA caller ID, voice calls from Microsoft come from the following number. Uses with spam filters should exclude this number.
162+
In the United States, if you haven't configured MFA caller ID, voice calls from Microsoft come from the following number. Users with spam filters should exclude this number.
163163

164164
* *+1 (855) 330-8653*
165165

Loading
Loading

articles/active-directory/develop/single-page-app-tutorial-03-sign-in-users.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ reactspalocal/
153153

154154
### Adding the sign in experience
155155

156-
1. Open *SignInButton.jsx* and add the following code, which creates a button that signs in the user using either a popup or redirect.
156+
1. Open *SignInButton.jsx* and add the following code, which creates a button that signs in the user using either a pop-up or redirect.
157157

158158
```javascript
159159
import React from "react";
@@ -255,4 +255,4 @@ reactspalocal/
255255
<!-- ::: zone-end -->
256256

257257
> [!div class="nextstepaction"]
258-
> [Tutorial: Call an API from a React single-page app](single-page-app-tutorial-04-call-api.md)
258+
> [Tutorial: Call an API from a React single-page app](single-page-app-tutorial-04-call-api.md)

articles/active-directory/develop/tutorial-v2-javascript-spa.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -185,11 +185,11 @@ In the next steps, you'll create a new folder for the JavaScript SPA and set up
185185

186186
<!-- msal.js with a fallback to backup CDN -->
187187
<script src="https://alcdn.msauth.net/browser/2.30.0/js/msal-browser.js"
188-
integrity="sha384-L8LyrNcolaRZ4U+N06atid1fo+kBo8hdlduw0yx+gXuACcdZjjquuGZTA5uMmUdS"
188+
integrity="sha384-o4ufwq3oKqc7IoCcR08YtZXmgOljhTggRwxP2CLbSqeXGtitAxwYaUln/05nJjit"
189189
crossorigin="anonymous"></script>
190190

191191
<!-- adding Bootstrap 4 for UI components -->
192-
<link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/bootstrap.min.css" integrity="sha384-o4ufwq3oKqc7IoCcR08YtZXmgOljhTggRwxP2CLbSqeXGtitAxwYaUln/05nJjit" crossorigin="anonymous">
192+
<link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/bootstrap.min.css" integrity="sha384-Vkoo8x4CGsO3+Hhxv8T/Q5PaXtkKtu6ug5TOeNV6gBiFeWPGFN9MuhOf23Q9Ifjh" crossorigin="anonymous">
193193
</head>
194194
<body>
195195
<nav class="navbar navbar-expand-lg navbar-dark bg-primary">
@@ -585,4 +585,4 @@ The Microsoft Graph API requires the `User.Read` scope to read a user's profile.
585585
Delve deeper into SPA development on the Microsoft identity platform in the first part of a scenario series:
586586

587587
> [!div class="nextstepaction"]
588-
> [Scenario: Single-page application](scenario-spa-overview.md)
588+
> [Scenario: Single-page application](scenario-spa-overview.md)

0 commit comments

Comments
 (0)