Skip to content

Commit 7b847fa

Browse files
authored
Merge pull request #205222 from MicrosoftDocs/main
7/19 AM Publish
2 parents 1651821 + 908cd1c commit 7b847fa

File tree

57 files changed

+814
-502
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

57 files changed

+814
-502
lines changed

articles/active-directory-b2c/javascript-and-page-layout.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -233,6 +233,21 @@ function addTermsOfUseLink() {
233233

234234
In the code, replace `termsOfUseUrl` with the link to your terms of use agreement. For your directory, create a new user attribute called **termsOfUse** and then include **termsOfUse** as a user attribute.
235235

236+
Alternatively, you can add a link at the bottom of self-asserted pages, without using of JavaScript. Use the following localization:
237+
238+
```xml
239+
<LocalizedResources Id="api.localaccountsignup.en">
240+
<LocalizedStrings>
241+
<!-- The following elements will display a link at the bottom of the page. -->
242+
<LocalizedString ElementType="UxElement" StringId="disclaimer_link_1_text">Terms of use</LocalizedString>
243+
<LocalizedString ElementType="UxElement" StringId="disclaimer_link_1_url">termsOfUseUrl</LocalizedString>
244+
</LocalizedStrings>
245+
</LocalizedResources>
246+
```
247+
248+
Replace `termsOfUseUrl` with the link to your organization's privacy policy and terms of use.
249+
250+
236251
## Next steps
237252

238253
Find more information about how to [Customize the user interface of your application in Azure Active Directory B2C](customize-ui-with-html.md).

articles/active-directory-b2c/localization-string-ids.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: reference
11-
ms.date: 04/12/2022
11+
ms.date: 04/19/2022
1212
ms.author: kengaderdus
1313
ms.subservice: B2C
1414
---
@@ -177,6 +177,18 @@ The following are the IDs for a content definition with an ID of `api.localaccou
177177
| **ver_intro_msg** | Verification is necessary. Please click Send button. |
178178
| **ver_input** | Verification code |
179179

180+
### Sign-up and self-asserted pages disclaimer links
181+
182+
The following `UxElement` string IDs will display disclaimer link(s) at the bottom of the self-asserted page. These links are not displayed by default unless specified in the localized strings.
183+
184+
| ID | Example value |
185+
| --- | ------------- |
186+
| **disclaimer_msg_intro** | By providing your phone number, you consent to receiving a one-time passcode sent by text message to help you sign into {insert your application name}. Standard messsage and data rates may apply. |
187+
| **disclaimer_link_1_text** | Privacy Statement |
188+
| **disclaimer_link_1_url** | {insert your privacy statement URL} |
189+
| **disclaimer_link_2_text** | Terms and Conditions |
190+
| **disclaimer_link_2_url** | {insert your terms and conditions URL} |
191+
180192
### Sign-up and self-asserted pages error messages
181193

182194
| ID | Default value |
@@ -238,6 +250,14 @@ The following example shows the use of some of the user interface elements in th
238250
<LocalizedString ElementType="UxElement" StringId="ver_input">Verification code</LocalizedString>
239251
<LocalizedString ElementType="UxElement" StringId="ver_intro_msg">Verification is necessary. Please click Send button.</LocalizedString>
240252
<LocalizedString ElementType="UxElement" StringId="ver_success_msg">E-mail address verified. You can now continue.</LocalizedString>
253+
<!-- The following elements will display a message and two links at the bottom of the page.
254+
For policies that you intend to show to users in the United States, we suggest displaying the following text. Replace the content of the disclaimer_link_X_url elements with links to your organization's privacy statement and terms and conditions.
255+
Uncomment any of these lines to display them. -->
256+
<!-- <LocalizedString ElementType="UxElement" StringId="disclaimer_msg_intro">By providing your phone number, you consent to receiving a one-time passcode sent by text message to help you sign into {insert your application name}. Standard messsage and data rates may apply.</LocalizedString> -->
257+
<!-- <LocalizedString ElementType="UxElement" StringId="disclaimer_link_1_text">Privacy Statement</LocalizedString>
258+
<LocalizedString ElementType="UxElement" StringId="disclaimer_link_1_url">{insert your privacy statement URL}</LocalizedString> -->
259+
<!-- <LocalizedString ElementType="UxElement" StringId="disclaimer_link_2_text">Terms and Conditions</LocalizedString>
260+
<LocalizedString ElementType="UxElement" StringId="disclaimer_link_2_url">{insert your terms and conditions URL}</LocalizedString> -->
241261
<LocalizedString ElementType="ErrorMessage" StringId="ServiceThrottled">There are too many requests at this moment. Please wait for some time and try again.</LocalizedString>
242262
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfClaimNotVerified">Claim not verified: {0}</LocalizedString>
243263
<LocalizedString ElementType="ErrorMessage" StringId="UserMessageIfClaimsPrincipalAlreadyExists">A user with the specified ID already exists. Please choose a different one.</LocalizedString>

articles/active-directory-b2c/phone-factor-technical-profile.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -93,6 +93,7 @@ The **CryptographicKeys** element is not used.
9393
| ManualPhoneNumberEntryAllowed| No | Specify whether or not a user is allowed to manually enter a phone number. Possible values: `true`, or `false` (default).|
9494
| setting.authenticationMode | No | The method to validate the phone number. Possible values: `sms`, `phone`, or `mixed` (default).|
9595
| setting.autodial| No| Specify whether the technical profile should auto dial or auto send an SMS. Possible values: `true`, or `false` (default). Auto dial requires the `setting.authenticationMode` metadata be set to `sms`, or `phone`. The input claims collection must have a single phone number. |
96+
| setting.autosubmit | No | Specifies whether the technical profile should auto submit the one-time password entry form. Possible values are `true` (default), or `false`. When auto-submit is turned off, the user needs to select a button to progress the journey. |
9697

9798
### UI elements
9899

articles/active-directory/app-provisioning/partner-driven-integrations.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ If you have built a SCIM Gateway and would like to add it to this list, follow t
8080
1. Review the Azure AD SCIM [documentation](use-scim-to-provision-users-and-groups.md) to understand the Azure AD SCIM implementation.
8181
1. Test compatibility between the Azure AD SCIM client and your SCIM gateway.
8282
1. Click the pencil at the top of this document to edit the article
83-
1. Once you're redirected to Github, click the pencil at the top of the article to start making changes
83+
1. Once you're redirected to GitHub, click the pencil at the top of the article to start making changes
8484
1. Make changes in the article using the Markdown language and create a pull request. Make sure to provide a description for the pull request.
8585
1. An admin of the repository will review and merge your changes so that others can view them.
8686

articles/active-directory/cloud-infrastructure-entitlement-management/how-to-create-group-based-permissions.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,8 @@ ms.author: kenwith
1515

1616
This article describes how you can create and manage group-based permissions in Permissions Management with the User management dashboard.
1717

18-
[!NOTE] The Permissions Management Administrator for all authorization systems will be able to create the new group based permissions.
18+
> [!NOTE]
19+
> The Permissions Management Administrator for all authorization systems will be able to create the new group based permissions.
1920
2021
## Select administrative permissions settings for a group
2122

articles/active-directory/conditional-access/concept-conditional-access-cloud-apps.md

Lines changed: 42 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 04/19/2022
9+
ms.date: 07/18/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -101,7 +101,7 @@ The following key applications are included in the Office 365 client app:
101101
- OneDrive
102102
- Power Apps
103103
- Power Automate
104-
- Security & Compliance Center
104+
- Security & compliance portal
105105
- SharePoint Online
106106
- Skype for Business Online
107107
- Skype and Teams Tenant Admin API
@@ -112,30 +112,35 @@ A complete list of all services included can be found in the article [Apps inclu
112112

113113
### Microsoft Azure Management
114114

115-
The Microsoft Azure Management application includes multiple services.
116-
117-
- Azure portal
118-
- Microsoft Entra admin center
119-
- Azure Resource Manager provider
120-
- Classic deployment model APIs
121-
- Azure PowerShell
122-
- Azure CLI
123-
- Azure DevOps
124-
- Azure Data Factory portal
125-
- Azure Event Hubs
126-
- Azure Service Bus
127-
- [Azure SQL Database](/azure/azure-sql/database/conditional-access-configure)
128-
- SQL Managed Instance
129-
- Azure Synapse
130-
- Visual Studio subscriptions administrator portal
115+
When Conditional Access policy is targeted to the Microsoft Azure Management application, within the Conditional Access policy app picker the policy will be enforced for tokens issued to application IDs of a set of services closely bound to the portal.
116+
117+
- Azure Resource Manager
118+
- Azure portal, which also covers the Microsoft Entra admin center
119+
- Azure Data Lake
120+
- Application Insights API
121+
- Log Analytics API
122+
123+
Because the policy is applied to the Azure management portal and API, services, or clients with an Azure API service dependency, can indirectly be impacted. For example:
124+
125+
- Classic deployment model APIs
126+
- Azure PowerShell
127+
- Azure CLI
128+
- Azure DevOps
129+
- Azure Data Factory portal
130+
- Azure Event Hubs
131+
- Azure Service Bus
132+
- [Azure SQL Database](/azure/azure-sql/database/conditional-access-configure)
133+
- SQL Managed Instance
134+
- Azure Synapse
135+
- Visual Studio subscriptions administrator portal
131136

132137
> [!NOTE]
133138
> The Microsoft Azure Management application applies to [Azure PowerShell](/powershell/azure/what-is-azure-powershell), which calls the [Azure Resource Manager API](../../azure-resource-manager/management/overview.md). It does not apply to [Azure AD PowerShell](/powershell/azure/active-directory/overview), which calls the [Microsoft Graph API](/graph/overview).
134139
135140
For more information on how to set up a sample policy for Microsoft Azure Management, see [Conditional Access: Require MFA for Azure management](howto-conditional-access-policy-azure-management.md).
136141

137-
>[!NOTE]
138-
>For Azure Government, you should target the Azure Government Cloud Management API application.
142+
> [!TIP]
143+
> For Azure Government, you should target the Azure Government Cloud Management API application.
139144
140145
### Other applications
141146

@@ -150,7 +155,23 @@ Administrators can add any Azure AD registered application to Conditional Access
150155
> [!NOTE]
151156
> Since Conditional Access policy sets the requirements for accessing a service you are not able to apply it to a client (public/native) application. In other words, the policy is not set directly on a client (public/native) application, but is applied when a client calls a service. For example, a policy set on SharePoint service applies to the clients calling SharePoint. A policy set on Exchange applies to the attempt to access the email using Outlook client. That is why client (public/native) applications are not available for selection in the Cloud Apps picker and Conditional Access option is not available in the application settings for the client (public/native) application registered in your tenant.
152157
153-
Some applications don't appear in the picker at all. The only way to include these applications in a Conditional Access policy is to include **All apps**.
158+
Some applications don't appear in the picker at all. The only way to include these applications in a Conditional Access policy is to include **All cloud apps**.
159+
160+
### All cloud apps
161+
162+
Applying a Conditional Access policy to **All cloud apps** will result in the policy being enforced for all tokens issued to web sites and services. This option includes applications that aren't individually targetable in Conditional Access policy, such as Azure Active Directory.
163+
164+
In some cases, an **All cloud apps** policy could inadvertently block user access. These cases are excluded from policy enforcement and include:
165+
166+
- Services required to achieve the desired security posture. For example, device enrollment calls are excluded from compliant device policy targeted to All cloud apps.
167+
168+
- Calls to Azure AD Graph and MS Graph, to access user profile, group membership and relationship information that is commonly used by applications excluded from policy. The excluded scopes are listed below. Consent is still required for apps to use these permissions.
169+
- For native clients:
170+
- Azure AD Graph: User.read
171+
- MS Graph: User.read, People.read, and UserProfile.read
172+
- For confidential / authenticated clients:
173+
- Azure AD Graph: User.read, User.read.all, and User.readbasic.all
174+
- MS Graph: User.read,User.read.all, User.read.All People.read, People.read.all, GroupMember.Read.All, Member.Read.Hidden, and UserProfile.read
154175

155176
## User actions
156177

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,8 @@ Devices must be registered in Azure AD before they can be marked as compliant. M
6969
> [!NOTE]
7070
> On Windows 7, iOS, Android, macOS, and some third-party web browsers Azure AD identifies the device using a client certificate that is provisioned when the device is registered with Azure AD. When a user first signs in through the browser the user is prompted to select the certificate. The end user must select this certificate before they can continue to use the browser.
7171
72+
You can use the Microsoft Defender for Endpoint app along with the Approved Client app policy in Intune to set device compliance policy Conditional Access policies. There's no exclusion required for the Microsoft Defender for Endpoint app while setting up Conditional Access. Although Microsoft Defender for Endpoint on Android & iOS (App ID - dd47d17a-3194-4d86-bfd5-c6ae6f5651e3) isn't an approved app, it has permission to report device security posture. This permission enables the flow of compliance information to Conditional Access.
73+
7274
### Require hybrid Azure AD joined device
7375

7476
Organizations can choose to use the device identity as part of their Conditional Access policy. Organizations can require that devices are hybrid Azure AD joined using this checkbox. For more information about device identities, see the article [What is a device identity?](../devices/overview.md).

0 commit comments

Comments
 (0)