Skip to content

Commit 6ef7366

Browse files
authored
Merge pull request #254884 from MicrosoftDocs/main
Publish 10/13 11:00 AM IST
2 parents 4745a5e + a6d9122 commit 6ef7366

File tree

75 files changed

+616
-281
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

75 files changed

+616
-281
lines changed

articles/active-directory/architecture/architecture-icons.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,14 +35,15 @@ Helping our customers design and architect new solutions is core to the Microsof
3535

3636
| Month | Change description |
3737
|-------|--------------------|
38-
| August 2023 | Added a downloadable package that contains the Microsoft Entra architecture icons, branding playbook (which contains guidelines about the Microsoft Security visual identity), and terms of use. |
38+
| October 12, 2023 | Updated the downloadable package to include more Microsoft Entra product icons and updated branding playbook. |
39+
| August 15, 2023 | Added a downloadable package that contains the Microsoft Entra architecture icons, branding playbook (which contains guidelines about the Microsoft Security visual identity), and terms of use. |
3940

4041
## Icon terms
4142

4243
Microsoft permits the use of these icons in architectural diagrams, training materials, or documentation. You may copy, distribute, and display the icons only for the permitted use unless granted explicit permission by Microsoft. Microsoft reserves all other rights.
4344

4445
> [!div class="button"]
45-
> [I agree to the above terms. Download icons.](https://download.microsoft.com/download/a/4/2/a4289cad-4eaf-4580-87fd-ce999a601516/Microsoft-Entra-architecture-icons.zip?wt.mc_id=microsoftentraicons_downloadmicrosoftentraicons_content_cnl_csasci)
46+
> [I agree to the above terms. Download icons.](https://download.microsoft.com/download/3/1/a/31a56038-856a-4489-88e4-ee5a1c4352be/Microsoft%20Entra%20architecture%20icons%20-%20Oct%202023.zip?wt.mc_id=microsoftentraicons_downloadmicrosoftentraicons_content_cnl_csasci)
4647
4748
## More icon sets from Microsoft
4849

articles/active-directory/cloud-infrastructure-entitlement-management/TOC.yml

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,14 +21,19 @@
2121
href: onboard-azure.MD
2222
- name: Onboard a GCP project
2323
href: onboard-gcp.md
24-
- name: Configure AWS IAM Identity Center as an identity provider
25-
href: how-to-configure-aws-iam.md
2624
- name: Enable or disable the controller after onboarding is complete
2725
href: onboard-enable-controller-after-onboarding.md
2826
- name: Add an account/ subscription/ project after onboarding is complete
2927
href: onboard-add-account-after-onboarding.md
3028
- name: Create folders to organize your Authorization Systems
3129
href: how-to-create-folders.md
30+
- name: Configure third-party integrations
31+
expanded: false
32+
items:
33+
- name: Configure AWS IAM Identity Center as an identity provider
34+
href: how-to-configure-aws-iam.md
35+
- name: Configure Okta as an identity provider
36+
href: how-to-configure-okta-as-an-identity-provider.md
3237
- name: View information about your Authorization Systems
3338
expanded: false
3439
items:
Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,110 @@
1+
---
2+
title: Configure Okta as an identity provider
3+
description: How to configure Okta as an identity provider in Microsoft Entra Permissions Management.
4+
services: active-directory
5+
author: jenniferf-skc
6+
manager: amycolannino
7+
ms.service: active-directory
8+
ms.subservice: ciem
9+
ms.workload: identity
10+
ms.topic: how-to
11+
ms.date: 10/10/2023
12+
ms.author: jfields
13+
---
14+
15+
# Configure Okta as an identity provider (preview)
16+
17+
This article describes how to integrate Okta as an identity provider (IdP) for an Amazon Web Services (AWS) account in Microsoft Entra Permissions Management.
18+
19+
Permissions Required:
20+
21+
22+
| **Account** | **Permissions Required** |**Why?** |
23+
|-----------------------|-----------------------------------------------------|---------------------------------|
24+
| Permissions Management | Permissions Management Administrator | Admin can create and edit the AWS authorization system onboarding configuration. |
25+
| Okta | API Access Management Administrator | Admin can add the application in the Okta portal and add or edit the API scope. |
26+
| AWS | AWS permissions explicitly | Admin should be able to run the cloudformation stack to create 1. AWS Secret in Secrets Manager; 2. Managed policy to allow the role to read the AWS secret. |
27+
28+
> [!NOTE]
29+
> While configuring the Amazon Web Services (AWS) app in Okta, the suggested AWS role group syntax is (```aws#{account alias]#{role name}#{account #]```).
30+
> Sample RegEx pattern for the group filter name are:
31+
> - ```^aws\#\S+\#?{{role}}[\w\-]+)\#(?{{accountid}}\d+)$```
32+
> - ```aws_(?{{accountid}}\d+)_(?{{role}}[a-zA-Z0-9+=,.@\-_]+)```
33+
> Permissions Management reads default suggested filters. Custom RegEx expression for group syntax is not supported.
34+
35+
## How to configure Okta as an identity provider
36+
37+
1. Log in to the Okta portal with API Access Management Administrator.
38+
2. Create a new **Okta API Services Application**.
39+
3. In the Admin Console, go to Applications.
40+
4. On the Create a new app integration page, select **API Services**.
41+
5. Enter a name for your app integration and click **Save**.
42+
6. Copy the **Client ID** for future use.
43+
7. In the **Client Credentials** section of the General tab, click **Edit** to change the client authentication method.
44+
8. Select **Public key/Private key** as the Client authentication method.
45+
9. Leave the default **Save keys in Okta**, then click **Add key**.
46+
10. Click **Add** and in the **Add a public key** dialog, either paste your own public key or click **Generate new key** to autogenerate a new 2048-bit RSA key.
47+
11. Copy **Public Key Id** for future use.
48+
12. Click **Generate new key** and the public and private keys appear in JWK format.
49+
13. Click **PEM**. The private key appears in PEM format.
50+
This is your only opportunity to save the private key. Click **Copy to clipboard** to copy the private key and store it somewhere safe.
51+
14. Click **Done**. The new public key is now registered with the app and appears in a table in the **PUBLIC KEYS** section of the **General** tab.
52+
15. From the Okta API scopes tab, grant these scopes:
53+
- okta.users.read
54+
- okta.groups.read
55+
- okta.apps.read
56+
16. Optional. Click the **Application rate limits** tab to adjust the rate-limit capacity percentage for this service application. By default, each new application sets this percentage at 50 percent.
57+
58+
### Convert public key to a Base64 string
59+
60+
1. See instructions for [using a personal access token (PAT)](https://go.microsoft.com/fwlink/?linkid=2249174).
61+
62+
### Find your Okta URL (also called an Okta domain)
63+
64+
This Okta URL/Okta domain is saved in the AWS secret.
65+
66+
1. Sign in to your Okta organization with your administrator account.
67+
2. Look for the Okta URL/Okta domain in the global header of the dashboard.
68+
Once located, note the Okta URL in an app such as Notepad. You'll need this URL for your next steps.
69+
70+
### Configure AWS stack details
71+
72+
1. Fill in the following fields on the **CloudFormation Template Specify stack details** screen using the information from your Okta application:
73+
- **Stack name** - A name of our choosing
74+
- **Or URL** Your organization's Okta URL, example: *https://companyname.okta.com*
75+
- **Client Id** - From the **Client Credentials** section of your Okta application
76+
- **Public Key Id** - Click **Add > Generate new key**. The public key is generated
77+
- **Private Key (in PEM format)** - Base64 encoded string of the PEM format of the **Private key**
78+
> [!NOTE]
79+
> You must copy all text in the field before converting to a Base64 string, including the dash before BEGIN PRIVATE KEY and after END PRIVATE KEY.
80+
2. When the **CloudFormation Template Specify stack details** screen is complete, click **Next**.
81+
3. On the **Configure stack options** screen, click **Next**.
82+
4. Review the information you've entered, then click **Submit**.
83+
5. Select the **Resources** tab, then copy the **Physical ID** (this ID is the Secret ARN) for future use.
84+
85+
### Configure Okta in Microsoft Entra Permissions Management
86+
87+
> [!NOTE]
88+
> Integrating Okta as an identity provider is an optional step. You can return to these steps to configure an IdP at any time.
89+
90+
1. If the **Data Collectors** dashboard isn't displayed when Permissions Management launches, select **Settings** (gear icon), and then select the **Data Collectors** subtab.
91+
2. On the **Data Collectors** dashboard, select **AWS**, and then select **Create Configuration**.
92+
Complete the **Manage Authorization System** steps.
93+
> [!NOTE]
94+
> If a Data Collector already exists in your AWS account and you want to add Okta integration, follow these steps:
95+
> 1. Select the Data Collector for which you want to add Okta integration.
96+
> 1. Click on the ellipsis next to the **Authorization System Status**.
97+
> 1. Select **Integrate Identity Provider**.
98+
99+
3. On the **Integrate Identity Provider (IdP)** page, select the box for **Okta**.
100+
4. Select **Launch CloudFormation Template**. The template opens in a new window.
101+
> [!NOTE]
102+
> Here you'll fill in information to create a secret Amazon Resource Name (ARN) that you'll enter on the **Integrate Identity Provider (IdP)** page. Microsoft does not read or store this ARN.
103+
5. Return to the Permissions Management **Integrate Identity Provider (IdP)** page and paste the **Secret ARN** in the field provided.
104+
6. Click **Next** to review and confirm the information you've entered.
105+
7. Click **Verify Now & Save**.
106+
The system returns the populated AWS CloudFormation Template.
107+
108+
## Next steps
109+
110+
- For information on how to view existing roles/policies, requests, and permissions, see [View roles/policies, requests, and permission in the Remediation dashboard](ui-remediation.md).

articles/active-directory/cloud-infrastructure-entitlement-management/product-permissions-analytics-reports.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ You can view the Permissions Analytics Report information directly in the Permis
6060
2. Locate the **Permissions Analytics Report** in the list, then select it.
6161
3. Select which Authorization System you want to generate the PDF download for (AWS, Azure, or GCP).
6262
>[!NOTE]
63-
> You can download a PDF report for up to 10 authorization systems at one time. The authorization systems must be part of the same cloud environment (for example, 1- 10 authorization systems that are all on Amazon Web Service (AWS)).
63+
> (Preview) You can download a PDF report for up to 10 authorization systems at one time. The authorization systems must be part of the same cloud environment (for example, 1- 10 authorization systems that are all on Amazon Web Service (AWS)).
6464
6565
The following message displays: **Successfully started to generate PDF report**.
6666

articles/active-directory/fundamentals/new-name.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ All features and capabilities are still available in the product. Licensing, ter
2929

3030
To make the transition seamless, all existing login URLs, APIs, PowerShell cmdlets, and Microsoft Authentication Libraries (MSAL) stay the same, as do developer experiences and tooling.
3131

32-
Service plan display names will change on October 1, 2023. Microsoft Entra ID Free, Microsoft Entra ID P1, and Microsoft Entra ID P2 will be the new names of standalone offers, and all capabilities included in the current Azure AD plans remain the same. Microsoft Entra ID – previously known as Azure AD – continues to be included in Microsoft 365 licensing plans, including Microsoft 365 E3 and Microsoft 365 E5. Details on pricing and what’s included are available on the [pricing and free trials page](https://aka.ms/PricingEntra).
32+
Service plan display names changed on October 1, 2023. Microsoft Entra ID Free, Microsoft Entra ID P1, and Microsoft Entra ID P2 are the new names of standalone offers, and all capabilities included in the current Azure AD plans remain the same. Microsoft Entra ID – previously known as Azure AD – continues to be included in Microsoft 365 licensing plans, including Microsoft 365 E3 and Microsoft 365 E5. Details on pricing and what’s included are available on the [pricing and free trials page](https://aka.ms/PricingEntra).
3333

3434
:::image type="content" source="./media/new-name/azure-ad-new-name.png" alt-text="Diagram showing the new name for Azure AD and Azure AD External Identities." border="false" lightbox="./media/new-name/azure-ad-new-name-high-res.png":::
3535

@@ -109,7 +109,7 @@ You can manage Microsoft Entra ID and all other Microsoft Entra solutions in the
109109

110110
### What are the display names for service plans and SKUs?
111111

112-
Licensing, pricing, and functionality aren't changing. Display names will be updated October 1, 2023 as follows.
112+
Licensing, pricing, and functionality aren't changing. Display names were updated October 1, 2023 as follows.
113113

114114
| **Old display name for service plan** | **New display name for service plan** |
115115
|---------|---------|
@@ -155,7 +155,7 @@ No. Prices, terms and service level agreements (SLAs) remain the same. Pricing d
155155

156156
### Will Microsoft Entra ID be available as a free service with an Azure subscription?
157157

158-
Customers using Azure AD Free as part of their Azure, Microsoft 365, Dynamics 365, Teams, or Intune subscription continue to have access to the same capabilities. It will be called Microsoft Entra ID Free. Get the free version at <https://www.microsoft.com/security/business/microsoft-entra-pricing>.
158+
Customers using Azure AD Free as part of their Azure, Microsoft 365, Dynamics 365, Teams, or Intune subscription continue to have access to the same capabilities. This is now called Microsoft Entra ID Free. Get the free version at <https://www.microsoft.com/security/business/microsoft-entra-pricing>.
159159

160160
### What's changing for Microsoft 365 or Azure AD for Office 365?
161161

@@ -251,6 +251,7 @@ Only official product names are capitalized, plus Conditional Access and My * ap
251251
| | Azure AD cloud-only identities<br/> Azure Active Directory cloud-only identities | Microsoft Entra cloud-only identities |
252252
| | Azure AD Connect<br/> Azure Active Directory Connect | Microsoft Entra Connect |
253253
| | Azure AD Connect Sync<br/> Azure Active Directory Connect Sync | Microsoft Entra Connect Sync |
254+
| | Azure AD connector<br/> Azure Active Directory connector | Microsoft Entra connector |
254255
| | Azure AD domain<br/> Azure Active Directory domain | Microsoft Entra domain |
255256
| | Azure AD Domain Services<br/> Azure Active Directory Domain Services | Microsoft Entra Domain Services |
256257
| | Azure AD enterprise application<br/> Azure Active Directory enterprise application | Microsoft Entra enterprise application |
@@ -261,6 +262,7 @@ Only official product names are capitalized, plus Conditional Access and My * ap
261262
| | Azure AD identity protection<br/> Azure Active Directory identity protection | Microsoft Entra ID Protection |
262263
| | Azure AD integrated authentication<br/> Azure Active Directory integrated authentication | Microsoft Entra integrated authentication |
263264
| | Azure AD join<br/> Azure AD joined<br/> Azure Active Directory join<br/> Azure Active Directory joined | Microsoft Entra join<br/> Microsoft Entra joined |
265+
| | Azure AD license<br/> Azure Active Directory license | Microsoft Entra ID license or license for Microsoft Entra ID |
264266
| | Azure AD login<br/> Azure Active Directory login | Microsoft Entra login |
265267
| | Azure AD managed identities<br/> Azure Active Directory managed identities | Microsoft Entra managed identities |
266268
| | Azure AD multifactor authentication (MFA)<br/> Azure Active Directory multifactor authentication (MFA) | Microsoft Entra multifactor authentication (MFA)<br/> (Second use: MFA) |
@@ -271,6 +273,7 @@ Only official product names are capitalized, plus Conditional Access and My * ap
271273
| | Azure AD password authentication<br/> Azure Active Directory password authentication | Microsoft Entra password authentication |
272274
| | Azure AD password hash synchronization (PHS)<br/> Azure Active Directory password hash synchronization (PHS) | Microsoft Entra password hash synchronization |
273275
| | Azure AD password protection<br/> Azure Active Directory password protection | Microsoft Entra password protection |
276+
| | Azure AD Premium<br/> Azure Active Directory Premium | Microsoft Entra ID P1 or P2 |
274277
| | Azure AD principal ID<br/> Azure Active Directory principal ID | Microsoft Entra principal ID |
275278
| | Azure AD Privileged Identity Management (PIM)<br/> Azure Active Directory Privileged Identity Management (PIM) | Microsoft Entra Privileged Identity Management (PIM) |
276279
| | Azure AD registered<br/> Azure Active Directory registered | Microsoft Entra registered |
@@ -291,6 +294,7 @@ Only official product names are capitalized, plus Conditional Access and My * ap
291294

292295
| Date | Change description |
293296
|------|--------------------|
297+
| October 12, 2023 | <br/>&#8226;Updated statement about availability of license plans. <br/>&#8226; Added three other terms in the glossary: "Azure AD connector", "Azure AD license", and "Azure AD Premium" |
294298
| September 15, 2023 | Added a link to the new article, [How to: Rename Azure AD](how-to-rename-azure-ad.md), updated the description for Azure AD B2C, and added more info about why the name Azure AD is changing. |
295299
| August 29, 2023 | <br/>&#8226; In the [glossary](#glossary-of-updated-terminology), corrected the entry for "Azure AD activity logs" to separate "Azure AD audit log", which is a distinct type of activity log. <br/>&#8226; Added Azure AD Sync and DirSync to the [What names aren't changing](#what-names-arent-changing) section. |
296300
| August 18, 2023 | <br/>&#8226; Updated the article to include a new section [Glossary of updated terminology](#glossary-of-updated-terminology), which includes the old and new terminology.<br/>&#8226; Updated info and added link to usage of the Microsoft Entra ID icon, and updates to verbiage in some sections. |

0 commit comments

Comments
 (0)