Skip to content

Commit 791c270

Browse files
authored
Merge pull request #104356 from davidmu1/manageapps1
Manageapps1
2 parents c196933 + 2091f80 commit 791c270

5 files changed

+7
-23
lines changed

articles/active-directory/manage-apps/application-proxy-configure-single-sign-on-with-ping-access.md

Lines changed: 2 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -157,21 +157,7 @@ To collect this information:
157157
1. Select **Add**. The PingAccess key appears in the table of client secrets, with a random string that autofills in the **VALUE** field.
158158
1. Next to the PingAccess key's **VALUE** field, select the **Copy to clipboard** icon, then copy and save it. You specify this value later as PingAccess's client secret.
159159

160-
### Update GraphAPI to send custom fields (optional)
161-
162-
If you need a custom claim that sends other tokens within the access_token consumed by PingAccess, set the `acceptMappedClaims` application field to `True`. You can use Graph Explorer or the Azure AD portal's application manifest to make this change.
163-
164-
**This example uses Graph Explorer:**
165-
166-
```
167-
PATCH https://graph.windows.net/myorganization/applications/<object_id_GUID_of_your_application>
168-
169-
{
170-
"acceptMappedClaims":true
171-
}
172-
```
173-
174-
**This example uses the [Azure Active Directory portal](https://aad.portal.azure.com/) to update the `acceptMappedClaims` field:**
160+
**Update the `acceptMappedClaims` field:**
175161

176162
1. Sign in to the [Azure Active Directory portal](https://aad.portal.azure.com/) as an application administrator.
177163
1. Select **Azure Active Directory** > **App registrations**. A list of applications appears.
@@ -210,7 +196,7 @@ To make your application use a custom claim and include additional fields, be su
210196
> [!NOTE]
211197
> To use a custom claim, you must also have a custom policy defined and assigned to the application. This policy should include all required custom attributes.
212198
>
213-
> You can do policy definition and assignment through PowerShell, Azure AD Graph Explorer, or Microsoft Graph. If you're doing them in PowerShell, you may need to first use `New-AzureADPolicy` and then assign it to the application with `Add-AzureADServicePrincipalPolicy`. For more information, see [Claims mapping policy assignment](../develop/active-directory-claims-mapping.md#claims-mapping-policy-assignment).
199+
> You can do policy definition and assignment through PowerShell or Microsoft Graph. If you're doing them in PowerShell, you may need to first use `New-AzureADPolicy` and then assign it to the application with `Add-AzureADServicePrincipalPolicy`. For more information, see [Claims mapping policy assignment](../develop/active-directory-claims-mapping.md#claims-mapping-policy-assignment).
214200
215201
Example:
216202
```powershell

articles/active-directory/manage-apps/application-sign-in-problem-federated-sso-gallery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ The application vendor should validate that they support the Azure AD SAML imple
159159

160160
## Misconfigured application
161161

162-
*Error AADSTS650056: Misconfigured application. This could be due to one of the following: The client has not listed any permissions for 'AAD Graph' in the requested permissions in the client's application registration. Or, The admin has not consented in the tenant. Or, Check the application identifier in the request to ensure it matches the configured client application identifier. Please contact your admin to fix the configuration or consent on behalf of the tenant.*.
162+
*Error AADSTS650056: Misconfigured application. This could be due to one of the following: The client has not listed any permissions in the requested permissions in the client's application registration. Or, The admin has not consented in the tenant. Or, Check the application identifier in the request to ensure it matches the configured client application identifier. Please contact your admin to fix the configuration or consent on behalf of the tenant.*.
163163

164164
**Possible cause**
165165

articles/active-directory/manage-apps/application-sign-in-problem-federated-sso-non-gallery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ The application vendor should validate that they support the Azure AD SAML imple
162162

163163
## Misconfigured application
164164

165-
*Error AADSTS650056: Misconfigured application. This could be due to one of the following: The client has not listed any permissions for 'AAD Graph' in the requested permissions in the client's application registration. Or, The admin has not consented in the tenant. Or, Check the application identifier in the request to ensure it matches the configured client application identifier. Please contact your admin to fix the configuration or consent on behalf of the tenant.*.
165+
*Error AADSTS650056: Misconfigured application. This could be due to one of the following: The client has not listed any permissions in the requested permissions in the client's application registration. Or, The admin has not consented in the tenant. Or, Check the application identifier in the request to ensure it matches the configured client application identifier. Please contact your admin to fix the configuration or consent on behalf of the tenant.*.
166166

167167
**Possible cause**
168168

articles/active-directory/manage-apps/configure-authentication-for-federated-users-portal.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -95,9 +95,7 @@ Policies only take effect for a specific application when they are attached to a
9595

9696
Only one HRD policy can be active on a service principal at any one time.
9797

98-
You can use either the Microsoft Azure Active Directory Graph API directly, or the Azure Active Directory PowerShell cmdlets to create and manage HRD policy.
99-
100-
The Graph API that manipulates policy is described in the [Operations on policy](https://msdn.microsoft.com/library/azure/ad/graph/api/policy-operations) article on MSDN.
98+
You can use the Azure Active Directory PowerShell cmdlets to create and manage HRD policy.
10199

102100
Following is an example HRD policy definition:
103101

@@ -204,7 +202,7 @@ To apply the HRD policy after you have created it, you can assign it to multiple
204202
#### Step 2: Locate the service principal to which to assign the policy
205203
You need the **ObjectID** of the service principals to which you want to assign the policy. There are several ways to find the **ObjectID** of service principals.
206204

207-
You can use the portal, or you can query [Microsoft Graph](https://msdn.microsoft.com/Library/Azure/Ad/Graph/api/entity-and-complex-type-reference#serviceprincipal-entity). You can also go to the [Graph Explorer Tool](https://developer.microsoft.com/graph/graph-explorer) and sign in to your Azure AD account to see all your organization's service principals.
205+
You can use the portal, or you can query [Microsoft Graph](https://docs.microsoft.com/graph/api/resources/serviceprincipal?view=graph-rest-beta). You can also go to the [Graph Explorer Tool](https://developer.microsoft.com/graph/graph-explorer) and sign in to your Azure AD account to see all your organization's service principals.
208206

209207
Because you are using PowerShell, you can use the following cmdlet to list the service principals and their IDs.
210208

articles/active-directory/manage-apps/manage-consent-requests.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ See [Grant tenant-wide admin consent to an application](grant-admin-consent.md)
9696

9797
### Granting consent on behalf of a specific user
9898

99-
Instead of granting consent for the entire organization, an administrator can also use the [Azure AD Graph API](https://docs.microsoft.com/azure/active-directory/develop/active-directory-graph-api) to grant consent to delegated permissions on behalf of a single user. To do this, send a `POST` request to create an [OAuth2PermissionGrant](https://docs.microsoft.com/previous-versions/azure/ad/graph/api/entity-and-complex-type-reference#oauth2permissiongrant-entity) entity where `consentType` is set to "Principal", and `principalId` is set to the object ID for the user on behalf of whom consent is being granted.
99+
Instead of granting consent for the entire organization, an administrator can also use the [Microsft Graph API](https://docs.microsoft.com/graph/use-the-api) to grant consent to delegated permissions on behalf of a single user. For more information, see [Get access on behalf of a user](https://docs.microsoft.com/graph/auth-v2-user).
100100

101101
## Limiting user access to applications
102102

0 commit comments

Comments
 (0)