Skip to content

Commit 6d5cae6

Browse files
authored
Merge pull request #7780 from MicrosoftDocs/FromPrivateRepo
From private repo
2 parents 3c8b642 + d29c63b commit 6d5cae6

File tree

207 files changed

+3513
-2002
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

207 files changed

+3513
-2002
lines changed

.openpublishing.redirection.json

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7356,7 +7356,7 @@
73567356
},
73577357
{
73587358
"source_path": "articles/sql-database/sql-database-manage-single-databases-portal.md",
7359-
"redirect_url": "/azure/sql-database/sql-database-service-tiers",
7359+
"redirect_url": "/azure/sql-database/sql-database-service-tiers-vcore",
73607360
"redirect_document_id": false
73617361
},
73627362
{
@@ -7421,7 +7421,7 @@
74217421
},
74227422
{
74237423
"source_path": "articles/sql-database/sql-database-scale-on-the-fly.md",
7424-
"redirect_url": "/azure/sql-database/sql-database-service-tiers",
7424+
"redirect_url": "/azure/sql-database/sql-database-service-tiers-vcore",
74257425
"redirect_document_id": false
74267426
},
74277427
{
@@ -7444,14 +7444,19 @@
74447444
"redirect_url": "/azure/sql-database/sql-database-security-overview",
74457445
"redirect_document_id": false
74467446
},
7447+
{
7448+
"source_path": "articles/sql-database/sql-database-service-tiers.md",
7449+
"redirect_url": "/azure/sql-database/sql-database-service-tiers-vcore",
7450+
"redirect_document_id": false
7451+
},
74477452
{
74487453
"source_path": "articles/sql-database/sql-database-server-overview.md",
74497454
"redirect_url": "/azure/sql-database/sql-database-servers-databases",
74507455
"redirect_document_id": false
74517456
},
74527457
{
74537458
"source_path": "articles/sql-database/sql-database-service-tier-advisor.md",
7454-
"redirect_url": "/azure/sql-database/sql-database-service-tiers",
7459+
"redirect_url": "/azure/sql-database/sql-database-service-tiers-vcore",
74557460
"redirect_document_id": false
74567461
},
74577462
{
@@ -18702,6 +18707,7 @@
1870218707
{
1870318708
"source_path": "articles/machine-learning/desktop-workbench/support-for-aml-services.md",
1870418709
"redirect_url": "/azure/machine-learning/service/support-for-aml-services",
18710+
"redirect_document_id": false
1870518711
},
1870618712
{
1870718713
"source_path": "articles/stream-analytics/stream-analytics-add-outputs.md",

articles/active-directory/TOC.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -269,6 +269,7 @@
269269
## Delegate access to resources
270270
### [Administrator roles](active-directory-assign-admin-roles-azure-portal.md)
271271
#### [Assign admin roles](active-directory-users-assign-role-azure-portal.md)
272+
#### [Default user permissions](users-default-permissions.md)
272273
### [Administrative units](active-directory-administrative-units-management.md)
273274
### [Configure token lifetimes](active-directory-configurable-token-lifetimes.md)
274275
### [Manage emergency access administrative accounts](active-directory-admin-manage-emergency-access-accounts.md)

articles/active-directory/active-directory-b2b-hybrid-organizations.md

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ tags: ''
1111
ms.service: active-directory
1212
ms.topic: article
1313
ms.workload: identity
14-
ms.date: 04/20/2018
14+
ms.date: 04/26/2018
1515
ms.author: twooley
1616
ms.reviewer: sasubram
1717

@@ -21,11 +21,24 @@ ms.reviewer: sasubram
2121

2222
Azure Active Directory (Azure AD) B2B collaboration makes it easy for you to give your external partners access to apps and resources in your organization. This is true even in a hybrid configuration where you have both on-premises and cloud-based resources. It doesn’t matter if you currently manage external partner accounts locally in your on-premises identity system, or if you manage the external accounts in the cloud as Azure AD B2B users. You can now grant these users access to resources in either location, using the same sign-in credentials for both environments.
2323

24+
## Grant B2B users in Azure AD access to your on-premises apps
25+
26+
If your organization uses Azure AD B2B collaboration capabilities to invite guest users from partner organizations to your Azure AD, you can now provide these B2B users access to on-premises apps.
27+
28+
For apps that use SAML-based authentication, you can make these apps available to B2B users through the Azure portal, using Azure AD Application Proxy for authentication.
29+
30+
For apps that use Integrated Windows Authentication (IWA) with Kerberos constrained delegation (KCD), you also use Azure AD Proxy for authentication. However, for authorization to work, a user object is required in the on-premises Windows Server Active Directory. There are two methods you can use to create local user objects that represent your B2B guest users.
31+
32+
- You can use Microsoft Identity Manager (MIM) 2016 SP1 and the MIM management agent for Microsoft Graph.
33+
- You can use a PowerShell script. (This solution does not require MIM.)
34+
35+
For details about how to implement these solutions, see [Grant B2B users in Azure AD access to your on-premises applications](active-directory-b2b-hybrid-cloud-to-on-premises.md).
36+
2437
## Grant locally-managed partner accounts access to cloud resources
2538

2639
Before Azure AD, organizations with on-premises identity systems have traditionally managed partner accounts in their on-premises directory. If you’re such an organization, you want to make sure that your partners continue to have access as you move your apps and other resources to the cloud. Ideally, you want these users to use the same set of credentials to access both cloud and on-premises resources.
2740

28-
We now offer methods where you can use Azure AD Connect to sync these local accounts to the cloud as "guest users," where the accounts behave just like Azure AD B2B users. This solution works even if you have an on-premises identity system that lets your partners use their own external email addresses as their sign-in name.
41+
We now offer methods where you can use Azure AD Connect to sync these local accounts to the cloud as "guest users," where the accounts behave just like Azure AD B2B users.
2942

3043
To help protect your company data, you can control access to just the right resources, and configure authorization policies that treat these guest users differently from your employees.
3144

@@ -34,5 +47,6 @@ For implementation details, see [Grant locally-managed partner accounts access t
3447
## Next steps
3548

3649
- [Grant B2B users in Azure AD access to your on-premises applications](active-directory-b2b-hybrid-cloud-to-on-premises.md)
50+
- [Grant locally-managed partner accounts access to cloud resources using Azure AD B2B collaboration](active-directory-b2b-hybrid-on-premises-to-cloud.md)
3751

3852

articles/active-directory/active-directory-saas-adobe-echosign-tutorial.md

Lines changed: 18 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: article
15-
ms.date: 06/24/2017
15+
ms.date: 04/26/2018
1616
ms.author: jeedes
1717

1818
---
@@ -127,40 +127,31 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
127127

128128
![Configure Single Sign-On](./media/active-directory-saas-adobe-echosign-tutorial/tutorial_adobesign_configure.png)
129129

130-
131130
7. In a different web browser window, log in to your Adobe Sign company site as an administrator.
132131

133-
8. In the menu on the top, click **Account**, and then, in the navigation pane on the left side, click **SAML Settings** under **Account Settings**.
132+
8. In the SAML menu, click **Account Settings**, and then, click **SAML Settings**.
134133

135-
![Account](./media/active-directory-saas-adobe-echosign-tutorial/ic789520.png "Account")
134+
![Account](./media/active-directory-saas-adobe-echosign-tutorial/ic789520.png "Account")
136135

137-
9. In the SAML Settings section, perform the following steps:
138-
139-
![SAML Settings](./media/active-directory-saas-adobe-echosign-tutorial/ic789521.png "SAML Settings")
136+
9. In the **SAML Settings** section, perform the following steps:
137+
138+
![SAML Settings](./media/active-directory-saas-adobe-echosign-tutorial/ic789521.png "SAML Settings")
140139

141-
a. As **SAML Mode**, select **SAML Mandatory**.
140+
a. As **SAML Mode**, select **SAML Mandatory**.
142141

143-
b. Select **Allow EchoSign Account Administrators to log in using their EchoSign Credentials**.
142+
b. Select **Allow Adobe sign Account Administrators to log in using their Adobe Sign Credentials**.
144143

145-
c. As **User Creation**, select **Automatically add users authenticated through SAML**.
146-
147-
10. Move on, performing the following steps:
144+
c. As **User Creation**, select **Automatically add users authenticated through SAML**.
148145

149-
![SAML Settings](./media/active-directory-saas-adobe-echosign-tutorial/ic789522.png "SAML Settings")
150-
151-
a. Paste **SAML Entity ID**, which you have copied from Azure portal into the **IdP Entity ID** textbox.
146+
d. Paste **SAML Entity ID**, which you have copied from Azure portal into the **Entity ID/Issuer URL** textbox.
152147

153-
b. Paste **SAML Single Sign-On Service URL**, which you have copied from Azure portal into the **IdP Login URL** textbox.
148+
e. Paste **SAML Single Sign-On Service URL**, which you have copied from Azure portal into the **Login URL/SSO Endpoint** textbox.
154149

155-
c. Paste **Sign-Out URL**, which you have copied from Azure portal into the **IdP Logout URL** textbox.
156-
157-
d. Open your downloaded **Certificate(Base64)** file in notepad, copy the content of it into your clipboard, and then paste it to the **IdP Certificate** textbox
150+
f. Paste **Sign-Out URL**, which you have copied from Azure portal into the **Logout URL/SLO Endpoint** textbox.
158151

159-
e. Click **Save Changes**.
152+
g. Open your downloaded **Certificate(Base64)** file in notepad, copy the content of it into your clipboard, and then paste it to the **IdP Certificate** textbox
160153

161-
> [!TIP]
162-
> You can now read a concise version of these instructions inside the [Azure portal](https://portal.azure.com), while you are setting up the app! After adding this app from the **Active Directory > Enterprise Applications** section, simply click the **Single Sign-On** tab and access the embedded documentation through the **Configuration** section at the bottom. You can read more about the embedded documentation feature here: [Azure AD embedded documentation]( https://go.microsoft.com/fwlink/?linkid=845985)
163-
>
154+
h. Click **Save Changes**.
164155

165156
### Creating an Azure AD test user
166157
The objective of this section is to create a test user in the Azure portal called Britta Simon.
@@ -206,15 +197,15 @@ To enable Azure AD users to log in to Adobe Sign, they must be provisioned into
206197

207198
2. In the menu on the top, click **Account**, and then, in the navigation pane on the left side, click **Users & Groups**, and then, click **Create a new user**.
208199

209-
![Account](./media/active-directory-saas-adobe-echosign-tutorial/ic789524.png "Account")
200+
![Account](./media/active-directory-saas-adobe-echosign-tutorial/ic789524.png "Account")
210201

211202
3. In the **Create New User** section, perform the following steps:
212203

213-
![Create User](./media/active-directory-saas-adobe-echosign-tutorial/ic789525.png "Create User")
204+
![Create User](./media/active-directory-saas-adobe-echosign-tutorial/ic789525.png "Create User")
214205

215-
a. Type the **Email Address**, **First Name**, and **Last Name** of a valid AAD account you want to provision into the related textboxes.
206+
a. Type the **Email Address**, **First Name**, and **Last Name** of a valid AAD account you want to provision into the related textboxes.
216207

217-
b. Click **Create User**.
208+
b. Click **Create User**.
218209

219210
>[!NOTE]
220211
>The Azure Active Directory account holder receives an email that includes a link to confirm the account before it becomes active.

articles/active-directory/active-directory-saas-clever-tutorial.md

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.workload: identity
1313
ms.tgt_pltfrm: na
1414
ms.devlang: na
1515
ms.topic: article
16-
ms.date: 04/18/2018
16+
ms.date: 04/27/2018
1717
ms.author: jeedes
1818

1919
---
@@ -108,12 +108,12 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
108108

109109
a. In the **Sign-on URL** textbox, type a URL using the following pattern: `https://clever.com/in/<companyname>`
110110

111-
b. In the **Identifier** textbox, type a URL using the following pattern: `https://clever.com/<companyname>`
111+
b. In the **Identifier** textbox, type the URL: `https://clever.com/oauth/saml/metadata.xml`
112112

113113
> [!NOTE]
114-
> These values are not real. Update these values with the actual Sign-On URL and Identifier. Contact [Clever Client support team](https://clever.com/about/contact/) to get these values.
114+
> Sign-on URL value is not real. Update this value with the actual Sign-On URL. Contact [Clever Client support team](https://clever.com/about/contact/) to get this value.
115115

116-
4. On the **SAML Signing Certificate** section, click the copy button to copy **App Federation Metadata Url** and paste it into notepad.
116+
4. On the **SAML Signing Certificate** section, click the copy button to copy **App Federation Metadata Url** and paste it into Notepad.
117117

118118
![Configure Single Sign-On](./media/active-directory-saas-clever-tutorial/tutorial_metadataurl.png)
119119

@@ -127,7 +127,8 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
127127

128128
| Attribute Name | Attribute Value |
129129
| --------------- | -------------------- |
130-
| clever.student.credentials.district\_username | user.userprincipalname |
130+
| clever.teacher.credentials.district_username|user.userprincipalname|
131+
| clever.student.credentials.district_username| user.userprincipalname |
131132
| Firstname | user.givenname |
132133
| Lastname | user.surname |
133134

@@ -155,19 +156,22 @@ In this section, you enable Azure AD single sign-on in the Azure portal and conf
155156

156157
![Instant Login](./media/active-directory-saas-clever-tutorial/ic798984.png "Instant Login")
157158

159+
> [!NOTE]
160+
> Before you can Test single sign-on, You have to contact [Clever Client support team](https://clever.com/about/contact/) to enable Office 365 SSO in the back end.
161+
158162
10. On the **Instant Login** page, perform the following steps:
159-
163+
160164
![Instant Login](./media/active-directory-saas-clever-tutorial/ic798985.png "Instant Login")
161-
165+
162166
a. Type the **Login URL**.
163-
167+
164168
>[!NOTE]
165169
>The **Login URL** is a custom value. Contact [Clever Client support team](https://clever.com/about/contact/) to get this value.
166-
170+
167171
b. As **Identity System**, select **ADFS**.
168172

169173
c. In the **Metadata URL** textbox, paste **App Federation Metadata Url** value which you have copied from the Azure portal.
170-
174+
171175
d. Click **Save**.
172176

173177
### Create an Azure AD test user

articles/active-directory/connect-health/active-directory-aadconnect-health-adfs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.workload: identity
1212
ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: get-started-article
15-
ms.date: 04/28/2018
15+
ms.date: 04/26/2018
1616
ms.author: billmath
1717
ms.custom: H1Hack27Feb2017
1818
---
@@ -111,7 +111,7 @@ The report provides the following information:
111111
>
112112
>
113113
114-
## Risky IP Report
114+
## Risky IP Report (Public Preview)
115115
AD FS customers may expose password authentication endpoints to the internet to provide authentication services for end users to access SaaS applications such as Office 365. In this case, it is possible for a bad actor to attempt logins against your AD FS system to guess an end user’s password and get access to application resources. AD FS provides the extranet account lockout functionality to prevent these types of attacks since AD FS in Windows Server 2012 R2. If you are on a lower version, we strongly recommend that you upgrade your AD FS system to Windows Server 2016. <br />
116116
Additionally, it is possible for a single IP address to attempt multiple logins against multiple users. In these cases, the number of attempts per user may be under the threshold for account lockout protection in AD FS. Azure AD Connect Health now provides the “Risky IP report” that detects this condition and notifies administrators when this occurs. The following are the key benefits for this report:
117117
- Detection of IP addresses that exceed a threshold of failed password-based logins
@@ -151,7 +151,7 @@ For example, the below report item indicates from the 6pm to 7pm hour window on
151151

152152
![Azure AD Connect Health Portal](./media/active-directory-aadconnect-health-adfs/report4c.png)
153153

154-
### Download Risky IP report (Public Preview)
154+
### Download Risky IP report
155155
Using the **Download** functionality, the whole risky IP address list in the past 30 days can be exported from the Connect Health Portal
156156
The export result will include all the failed AD FS sign-in activities in each detection time window, so you can customize the filtering after the export.
157157
Besides the highlighted aggregations in the portal, the export result also shows more details about failed sign-in activities per IP address:

articles/active-directory/develop/active-directory-authentication-scenarios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Now that you have an overview of the basics, read the sections below to understa
6161

6262
## Claims in Azure AD security tokens
6363

64-
Security tokens issued by Azure AD contain claims, or assertions of information about the subject that has been authenticated. These claims can be used by the application for various tasks. For example, applications can use claims to validate the token, identify the subject's directory tenant, display user information, determine the subject's authorization, and so on. The claims present in any given security token are dependent upon the type of token, the type of credential used to authenticate the user, and the application configuration. A brief description of each type of claim emitted by Azure AD is provided in the table below. For more information, refer to [Supported token and claim types](active-directory-token-and-claims.md).
64+
Security tokens (access and id tokens) issued by Azure AD contain claims, or assertions of information about the subject that has been authenticated. These claims can be used by the application for various tasks. For example, applications can use claims to validate the token, identify the subject's directory tenant, display user information, determine the subject's authorization, and so on. The claims present in any given security token are dependent upon the type of token, the type of credential used to authenticate the user, and the application configuration. A brief description of each type of claim emitted by Azure AD is provided in the table below. For more information, refer to [Supported token and claim types](active-directory-token-and-claims.md).
6565

6666
| Claim | Description |
6767
| --- | --- |

0 commit comments

Comments
 (0)