Skip to content

Commit 70ac058

Browse files
Merge pull request #230087 from kenwith/patch-40
Updates for acrolinx.
2 parents 115a2ec + 30015d1 commit 70ac058

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/app-provisioning/use-scim-to-provision-users-and-groups.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-provisioning
99
ms.workload: identity
1010
ms.topic: tutorial
11-
ms.date: 03/08/2023
11+
ms.date: 03/09/2023
1212
ms.author: kenwith
1313
ms.reviewer: arvinh
1414
---
@@ -888,7 +888,7 @@ organization.",
888888

889889
**TLS Protocol Versions**
890890

891-
The only acceptable TLS protocol versions are TLS 1.2 and TLS 1.3. No other versions of TLS are permitted. No version of SSL is permitted.
891+
The only acceptable protocol versions are TLS 1.2 and TLS 1.3. No other SSL/TLS versions are permitted.
892892

893893
- RSA keys must be at least 2,048 bits.
894894
- ECC keys must be at least 256 bits, generated using an approved elliptic curve
@@ -973,19 +973,19 @@ The .NET Core SDK includes an HTTPS development certificate that is used during
973973
* Microsoft.SCIM.WebHostSample: `https://localhost:5001`
974974
* IIS Express: `https://localhost:44359`
975975
976-
For more information on HTTPS in ASP.NET Core use the following link:
976+
For more information on HTTPS in ASP.NET Core, use the following link:
977977
[Enforce HTTPS in ASP.NET Core](/aspnet/core/security/enforcing-ssl)
978978

979979
### Handling endpoint authentication
980980

981-
Requests from Azure AD Provisioning Service include an OAuth 2.0 bearer token. The bearer token is a security token that's issued by an authorization server, such as Azure AD and is trusted by your application. You can configure the Azure AD provisions service to use one of the following tokens:
981+
Requests from Azure AD Provisioning Service include an OAuth 2.0 bearer token. An authorization server issues the bearer token. Azure AD is an example of a trusted authorization server. Configure the Azure AD provisioning service to use one of the following tokens:
982982

983983
- A long-lived bearer token. If the SCIM endpoint requires an OAuth bearer token from an issuer other than Azure AD, then copy the required OAuth bearer token into the optional **Secret Token** field. In a development environment, you can use the testing token from the `/scim/token` endpoint. Test tokens shouldn't be used in production environments.
984984

985985
- Azure AD bearer token. If **Secret Token** field is left blank, Azure AD includes an OAuth bearer token issued from Azure AD with each request. Apps that use Azure AD as an identity provider can validate this Azure AD-issued token.
986986

987987
- The application that receives requests should validate the token issuer as being Azure AD for an expected Azure AD tenant.
988-
- In the token, the issuer is identified by an `iss` claim. For example, `"iss":"https://sts.windows.net/12345678-0000-0000-0000-000000000000/"`. In this example, the base address of the claim value, `https://sts.windows.net` identifies Azure AD as the issuer, while the relative address segment, _12345678-0000-0000-0000-000000000000_, is a unique identifier of the Azure AD tenant for which the token was issued.
988+
- An `iss` claim identifies the issuer of the token. For example, `"iss":"https://sts.windows.net/12345678-0000-0000-0000-000000000000/"`. In this example, the base address of the claim value, `https://sts.windows.net` identifies Azure AD as the issuer, while the relative address segment, _12345678-0000-0000-0000-000000000000_, is a unique identifier of the Azure AD tenant for which the token was issued.
989989
- The audience for a token is the **Application ID** for the application in the gallery. Applications registered in a single tenant receive the same `iss` claim with SCIM requests. The application ID for all custom apps is _8adf8e6e-67b2-4cf2-a259-e3dc5476c621_. The token generated by the Azure AD provisioning service should only be used for testing. It shouldn't be used in production environments.
990990

991991

0 commit comments

Comments
 (0)