Skip to content

Commit 715c9d6

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into essentials-articles-batch-3
2 parents 7c0a9f1 + 65a4814 commit 715c9d6

File tree

426 files changed

+25104
-24664
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

426 files changed

+25104
-24664
lines changed

.openpublishing.redirection.json

Lines changed: 21990 additions & 21980 deletions
Large diffs are not rendered by default.

articles/active-directory/cloud-infrastructure-entitlement-management/partner-list.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Microsoft verified partners can help you onboard Microsoft Entra Permissions Man
3131
* **Onboarding and Deployment Support**
3232

3333
Partners can guide you through the entire onboarding and deployment process for
34-
ermissions Management across AWS, Azure, and GCP.
34+
Permissions Management across AWS, Azure, and GCP.
3535

3636

3737
## Partner list

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,6 @@ To apply this grant control, the device must be registered in Azure AD, which re
9494
The following client apps support this setting, this list isn't exhaustive and is subject to change::
9595

9696
- Microsoft Azure Information Protection
97-
- Microsoft Bookings
9897
- Microsoft Cortana
9998
- Microsoft Dynamics 365
10099
- Microsoft Edge
@@ -114,7 +113,6 @@ The following client apps support this setting, this list isn't exhaustive and i
114113
- Microsoft PowerPoint
115114
- Microsoft SharePoint
116115
- Microsoft Skype for Business
117-
- Microsoft StaffHub
118116
- Microsoft Stream
119117
- Microsoft Teams
120118
- Microsoft To-Do

articles/active-directory/conditional-access/location-condition.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Location condition in Azure Active Directory Conditional Access
3-
description: Use the location condition to control access based on user physical or network location.
3+
description: Learn about creating location-based Conditional Access policies using Azure AD.
44

55
services: active-directory
66
ms.service: active-directory

articles/active-directory/develop/msal-net-aad-b2c-considerations.md

Lines changed: 15 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: conceptual
1111
ms.workload: identity
12-
ms.date: 05/07/2020
12+
ms.date: 02/21/2023
1313
ms.author: henrymbugua
1414
ms.reviewer: saeeda, jeferrie
1515
ms.custom: "devx-track-csharp, aaddev"
@@ -29,9 +29,9 @@ This article applies to MSAL.NET 3.x. For MSAL.NET 2.x, see [Azure AD B2C specif
2929

3030
The authority format for Azure AD B2C is: `https://{azureADB2CHostname}/tfp/{tenant}/{policyName}`
3131

32-
- `azureADB2CHostname` - The name of the Azure AD B2C tenant plus the host. For example, *contosob2c.b2clogin.com*.
33-
- `tenant` - The domain name or the directory (tenant) ID of the Azure AD B2C tenant. For example, *contosob2c.onmicrosoft.com* or a GUID, respectively.
34-
- `policyName` - The name of the user flow or custom policy to apply. For example, a sign-up/sign-in policy like *b2c_1_susi*.
32+
- `azureADB2CHostname` - The name of the Azure AD B2C tenant plus the host. For example, _contosob2c.b2clogin.com_.
33+
- `tenant` - The domain name or the directory (tenant) ID of the Azure AD B2C tenant. For example, _contosob2c.onmicrosoft.com_ or a GUID, respectively.
34+
- `policyName` - The name of the user flow or custom policy to apply. For example, a sign-up/sign-in policy like _b2c_1_susi_.
3535

3636
For more information about Azure AD B2C authorities, see [Set redirect URLs to b2clogin.com](../../active-directory-b2c/b2clogin.md).
3737

@@ -77,7 +77,7 @@ catch (MsalUiRequiredException ex)
7777
.WithAccount(account)
7878
.WithParentActivityOrWindow(ParentActivityOrWindow)
7979
.ExecuteAsync();
80-
}
80+
}
8181
```
8282

8383
In the preceding code snippet:
@@ -116,12 +116,12 @@ private async void EditProfileButton_Click(object sender, RoutedEventArgs e)
116116

117117
For more information on the ROPC flow, see [Sign in with resource owner password credentials grant](v2-oauth-ropc.md).
118118

119-
The ROPC flow is **not recommended** because asking a user for their password in your application is not secure. For more information about this problem, see [What’s the solution to the growing problem of passwords?](https://news.microsoft.com/features/whats-solution-growing-problem-passwords-says-microsoft/).
119+
The ROPC flow is **not recommended** because asking a user for their password in your application isn't secure. For more information about this problem, see [What’s the solution to the growing problem of passwords?](https://news.microsoft.com/features/whats-solution-growing-problem-passwords-says-microsoft/).
120120

121121
By using username/password in an ROPC flow, you sacrifice several things:
122122

123123
- Core tenets of modern identity: The password can be fished or replayed because the shared secret can be intercepted. By definition, ROPC is incompatible with passwordless flows.
124-
- Users who need to do MFA won't be able to sign in (as there is no interaction).
124+
- Users who use multi-factor authentication (MFA) won't be able to sign in as there's no interaction.
125125
- Users won't be able to use single sign-on (SSO).
126126

127127
### Configure the ROPC flow in Azure AD B2C
@@ -137,21 +137,19 @@ AcquireTokenByUsernamePassword(
137137
SecureString password)
138138
```
139139

140-
This `AcquireTokenByUsernamePassword` method takes the following parameters:
140+
The `AcquireTokenByUsernamePassword` method takes the following parameters:
141141

142-
- The *scopes* for which to obtain an access token.
143-
- A *username*.
144-
- A SecureString *password* for the user.
142+
- The _scopes_ for which to obtain an access token.
143+
- A _username_.
144+
- A SecureString _password_ for the user.
145145

146146
### Limitations of the ROPC flow
147147

148148
The ROPC flow **only works for local accounts**, where your users have registered with Azure AD B2C using an email address or username. This flow doesn't work when federating to an external identity provider supported by Azure AD B2C (Facebook, Google, etc.).
149149

150150
## Google auth and embedded webview
151151

152-
If you're using Google as an identity provider, we recommend you use the system browser as Google doesn't allow [authentication from embedded webviews](https://developers.googleblog.com/2016/08/modernizing-oauth-interactions-in-native-apps.html). Currently, `login.microsoftonline.com` is a trusted authority with Google and will work with embedded webview. However, `b2clogin.com` is not a trusted authority with Google, so users will not be able to authenticate.
153-
154-
We'll provide an update to this [issue](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet/issues/688) if things change.
152+
If you're using Google as an identity provider, we recommend you use the system browser as Google doesn't allow [authentication from embedded webviews](https://developers.googleblog.com/2016/08/modernizing-oauth-interactions-in-native-apps.html). Currently, `login.microsoftonline.com` is a trusted authority with Google and will work with embedded webview. However, `b2clogin.com` isn't a trusted authority with Google, so users won't be able to authenticate.
155153

156154
## Token caching in MSAL.NET
157155

@@ -186,6 +184,6 @@ For more information about specifying which claims are returned by your user flo
186184

187185
More details about acquiring tokens interactively with MSAL.NET for Azure AD B2C applications are provided in the following sample.
188186

189-
| Sample | Platform | Description|
190-
|------ | -------- | -----------|
191-
|[active-directory-b2c-xamarin-native](https://github.com/Azure-Samples/active-directory-b2c-xamarin-native) | Xamarin iOS, Xamarin Android, UWP | A Xamarin Forms app that uses MSAL.NET to authenticate users via Azure AD B2C and then access a web API with the tokens returned.|
187+
| Sample | Platform | Description |
188+
| ----------------------------------------------------------------------------------------------------------- | --------------------------------- | --------------------------------------------------------------------------------------------------------------------------------- |
189+
| [active-directory-b2c-xamarin-native](https://github.com/Azure-Samples/active-directory-b2c-xamarin-native) | Xamarin iOS, Xamarin Android, UWP | A Xamarin Forms app that uses MSAL.NET to authenticate users via Azure AD B2C and then access a web API with the tokens returned. |

articles/active-directory/develop/workload-identity-federation-create-trust.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -431,7 +431,7 @@ The Microsoft Graph endpoint (`https://graph.microsoft.com`) exposes REST APIs t
431431
Run the following method to [create a new federated identity credential](/graph/api/application-post-federatedidentitycredentials) on your app (specified by the object ID of the app). The *issuer* identifies GitHub as the external token issuer. *subject* identifies the GitHub organization, repo, and environment for your GitHub Actions workflow. When the GitHub Actions workflow requests Microsoft identity platform to exchange a GitHub token for an access token, the values in the federated identity credential are checked against the provided GitHub token.
432432

433433
```azurecli
434-
az rest --method POST --uri 'https://graph.microsoft.com/applications/f6475511-fd81-4965-a00e-41e7792b7b9c/federatedIdentityCredentials' --body '{"name":"Testing","issuer":"https://token.actions.githubusercontent.com/","subject":"repo:octo-org/octo-repo:environment:Production","description":"Testing","audiences":["api://AzureADTokenExchange"]}'
434+
az rest --method POST --uri 'https://graph.microsoft.com/applications/f6475511-fd81-4965-a00e-41e7792b7b9c/federatedIdentityCredentials' --body '{"name":"Testing","issuer":"https://token.actions.githubusercontent.com","subject":"repo:octo-org/octo-repo:environment:Production","description":"Testing","audiences":["api://AzureADTokenExchange"]}'
435435
```
436436

437437
And you get the response:
@@ -443,15 +443,15 @@ And you get the response:
443443
],
444444
"description": "Testing",
445445
"id": "1aa3e6a7-464c-4cd2-88d3-90db98132755",
446-
"issuer": "https://token.actions.githubusercontent.com/",
446+
"issuer": "https://token.actions.githubusercontent.com",
447447
"name": "Testing",
448448
"subject": "repo:octo-org/octo-repo:environment:Production"
449449
}
450450
```
451451

452452
*name*: The name of your Azure application.
453453

454-
*issuer*: The path to the GitHub OIDC provider: `https://token.actions.githubusercontent.com/`. This issuer will become trusted by your Azure application.
454+
*issuer*: The path to the GitHub OIDC provider: `https://token.actions.githubusercontent.com`. This issuer will become trusted by your Azure application.
455455

456456
*subject*: Before Azure will grant an access token, the request must match the conditions defined here.
457457
- For Jobs tied to an environment: `repo:< Organization/Repository >:environment:< Name >`

articles/active-directory/enterprise-users/licensing-service-plan-reference.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -424,10 +424,8 @@ The following service plans cannot be assigned together:
424424
| Service Plan Name | GUID |
425425
| --- | --- |
426426
| EXCHANGE_B_STANDARD | 90927877-dcff-4af6-b346-2332c0b15bb7 |
427-
| EXCHANGE_L_STANDARD | d42bdbd6-c335-4231-ab3d-c8f348d5aff5 |
428427
| EXCHANGE_S_ARCHIVE | da040e0a-b393-4bea-bb76-928b3fa1cf5a |
429428
| EXCHANGE_S_DESKLESS | 4a82b400-a79f-41a4-b4e2-e94f5787b113 |
430-
| EXCHANGE_S_ENTERPRISE | efb87545-963c-4e0d-99df-69c6916d9eb0 |
431429
| EXCHANGE_S_ESSENTIALS | 1126bef5-da20-4f07-b45e-ad25d2581aa8 |
432430
| EXCHANGE_S_STANDARD | 9aaf7827-d63c-4b61-89c3-182f06f82e5c |
433431
| EXCHANGE_S_STANDARD_MIDMARKET | fc52cc4b-ed7d-472d-bbe7-b081c23ecc56 |

articles/active-directory/fundamentals/1-secure-access-posture.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.workload: identity
99
ms.subservice: fundamentals
1010
ms.topic: conceptual
11-
ms.date: 02/03/2023
11+
ms.date: 02/23/2023
1212
ms.author: jricketts
1313
ms.reviewer: ajburnle
1414
ms.custom: "it-pro, seodec18"
@@ -24,6 +24,10 @@ As you consider the governance of external access, assess your organization's se
2424
> [!NOTE]
2525
> A high degree of control over collaboration can lead to higher IT budgets, reduced productivity, and delayed business outcomes. When official collaboration channels are perceived as onerous, end users tend to evade official channels. An example is end users sending unsecured documents by email.
2626
27+
## Before you begin
28+
29+
This article is number 1 in a series of 10 articles. We recommend you review the articles in order. Go to the **Next steps** section to see the entire series.
30+
2731
## Scenario-based planning
2832

2933
IT teams can delegate partner access to empower employees to collaborate with partners. This delegation can occur while maintaining sufficient security to protect intellectual property.
@@ -77,22 +81,24 @@ IT teams can delegate access decisions to business owners through entitlement ma
7781

7882
## Next steps
7983

80-
See the following articles to learn more about securing external access to resources. We recommend you follow the listed order.
84+
Use the following series of articles to learn about securing external access to resources. We recommend you follow the listed order.
8185

8286
1. [Determine your security posture for external access with Azure AD](1-secure-access-posture.md) (You're here)
8387

8488
2. [Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
8589

86-
3. [Create a security plan for external access](3-secure-access-plan.md)
90+
3. [Create a security plan for external access to resources](3-secure-access-plan.md)
8791

8892
4. [Secure external access with groups in Azure AD and Microsoft 365](4-secure-access-groups.md)
8993

9094
5. [Transition to governed collaboration with Azure AD B2B collaboration](5-secure-access-b2b.md)
9195

9296
6. [Manage external access with Azure AD entitlement management](6-secure-access-entitlement-managment.md)
9397

94-
7. [Manage external access with Conditional Access policies](7-secure-access-conditional-access.md)
98+
7. [Manage external access to resources with Conditional Access policies](7-secure-access-conditional-access.md)
9599

96100
8. [Control external access to resources in Azure AD with sensitivity labels](8-secure-access-sensitivity-labels.md)
97101

98-
9. [Secure external access to Microsoft Teams, SharePoint, and OneDrive with Azure AD](9-secure-access-teams-sharepoint.md)
102+
9. [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business with Azure AD](9-secure-access-teams-sharepoint.md)
103+
104+
10. [Convert local guest accounts to Azure Active Directory B2B guest accounts](10-secure-local-guest.md)

articles/active-directory/fundamentals/10-secure-local-guest.md

Lines changed: 28 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
author: gargi-sinha
66
ms.author: gasinh
77
manager: martinco
8-
ms.date: 02/22/2023
8+
ms.date: 02/23/2023
99
ms.topic: how-to
1010
ms.service: active-directory
1111
ms.subservice: enterprise-users
@@ -14,12 +14,16 @@ ms.custom: it-pro
1414
ms.collection: M365-identity-device-management
1515
---
1616

17-
# Convert local guest accounts to Azure Active Directory B2B guest accounts
17+
# Convert local guest accounts to Azure Active Directory B2B guest accounts
1818

1919
With Azure Active Directory (Azure AD B2B), external users collaborate with their identities. Although organizations can issue local usernames and passwords to external users, this approach isn't recommended. Azure AD B2B has improved security, lower cost, and less complexity, compared to creating local accounts. In addition, if your organization issues local credentials that external users manage, you can use Azure AD B2B instead. Use the guidance in this document to make the transition.
2020

2121
Learn more: [Plan an Azure AD B2B collaboration deployment](secure-external-access-resources.md)
2222

23+
## Before you begin
24+
25+
This article is number 10 in a series of 10 articles. We recommend you review the articles in order. Go to the **Next steps** section to see the entire series.
26+
2327
## Identify external-facing applications
2428

2529
Before migrating local accounts to Azure AD B2B, confirm the applications and workloads external users can access. For example, for applications hosted on-premises, validate the application is integrated with Azure AD. On-premises applications are a good reason to create local accounts.
@@ -44,7 +48,7 @@ After mapping external local accounts to identities, add external identities or
4448

4549
## End user communications
4650

47-
Notify external users about migration timing. Communicate expectations, such as when external users must stop using a current password to enable authenticate by home and corporate credentials. Communications can include email campaigns and announcements.
51+
Notify external users about migration timing. Communicate expectations, for instance when external users must stop using a current password to enable authentication by home and corporate credentials. Communications can include email campaigns and announcements.
4852

4953
## Migrate local guest accounts to Azure AD B2B
5054

@@ -63,15 +67,24 @@ If external user local accounts were synced from on-premises, reduce their on-pr
6367

6468
## Next steps
6569

66-
See the following articles on securing external access to resources. We recommend you take the actions in the listed order.
67-
68-
1. [Determine your desired security posture for external access](1-secure-access-posture.md)
69-
1. [Discover your current state](2-secure-access-current-state.md)
70-
1. [Create a governance plan](3-secure-access-plan.md)
71-
1. [Use groups for security](4-secure-access-groups.md)
72-
1. [Transition to Azure AD B2B](5-secure-access-b2b.md)
73-
1. [Secure access with Entitlement Management](6-secure-access-entitlement-managment.md)
74-
1. [Secure access with Conditional Access policies](7-secure-access-conditional-access.md)
75-
1. [Secure access with Sensitivity labels](8-secure-access-sensitivity-labels.md)
76-
1. [Secure access to Microsoft Teams, OneDrive, and SharePoint](9-secure-access-teams-sharepoint.md)
77-
1. [Convert local guest accounts to B2B](10-secure-local-guest.md) (You’re here)
70+
Use the following series of articles to learn about securing external access to resources. We recommend you follow the listed order.
71+
72+
1. [Determine your security posture for external access with Azure AD](1-secure-access-posture.md)
73+
74+
2. [Discover the current state of external collaboration in your organization](2-secure-access-current-state.md)
75+
76+
3. [Create a security plan for external access to resources](3-secure-access-plan.md)
77+
78+
4. [Secure external access with groups in Azure AD and Microsoft 365](4-secure-access-groups.md)
79+
80+
5. [Transition to governed collaboration with Azure AD B2B collaboration](5-secure-access-b2b.md)
81+
82+
6. [Manage external access with Azure AD entitlement management](6-secure-access-entitlement-managment.md)
83+
84+
7. [Manage external access to resources with Conditional Access policies](7-secure-access-conditional-access.md)
85+
86+
8. [Control external access to resources in Azure AD with sensitivity labels](8-secure-access-sensitivity-labels.md)
87+
88+
9. [Secure external access to Microsoft Teams, SharePoint, and OneDrive for Business with Azure AD](9-secure-access-teams-sharepoint.md) (You're here)
89+
90+
10. [Convert local guest accounts to Azure Active Directory B2B guest accounts](10-secure-local-guest.md) (You're here)

0 commit comments

Comments
 (0)