Skip to content

Commit 7cbc15a

Browse files
Merge branch 'MicrosoftDocs:main' into docs-editor/defender-for-storage-test-1693904391
2 parents 8e6459f + 61327bf commit 7cbc15a

File tree

130 files changed

+1230
-589
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

130 files changed

+1230
-589
lines changed

articles/active-directory/develop/includes/web-app-client-credentials.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,4 +72,8 @@ Instead of a client secret, you can provide a client certificate. The following
7272
}
7373
```
7474

75-
*Microsoft.Identity.Web* provides several ways to describe certificates, both by configuration or by code. For details, see [Microsoft.Identity.Web - Using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Using-certificates) on GitHub.
75+
> [!WARNING]
76+
>
77+
> If you forget to change the `Scopes` to an array, when you try to use the `IDownstreamApi` the scopes will appear null, and `IDownstreamApi` will attempt an anonymous (unauthenticated) call to the downstream API, which will result in a `401/unauthenticated`.
78+
79+
*Microsoft.Identity.Web* provides several ways to describe certificates, both by configuration or by code. For details, see [Microsoft.Identity.Web - Using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Using-certificates) on GitHub.

articles/active-directory/develop/saml-claims-customization.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,10 +210,14 @@ When the following conditions occur after **Add** or **Run test** is selected, a
210210

211211
## Add the UPN claim to SAML tokens
212212

213-
The `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn` claim is part of the [SAML restricted claim set](reference-claims-mapping-policy-type.md), so you can't add it in the **Attributes & Claims** section. As a workaround, you can add it as an [optional claim](./optional-claims.md) through **App registrations** in the Azure portal.
213+
The `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn` claim is part of the [SAML restricted claim set](reference-claims-mapping-policy-type.md#saml-restricted-claim-set). If you have custom signing key configured, you can add it in the **Attributes & Claims** section.
214214

215+
In case there is no custom signing key configured, please refer to [SAML Restricted claim set](reference-claims-mapping-policy-type.md#saml-restricted-claim-set). You can add it as an [optional claim](./optional-claims.md) through **App registrations** in the Azure portal.
216+
215217
Open the application in **App registrations**, select **Token configuration**, and then select **Add optional claim**. Select the **SAML** token type, choose **upn** from the list, and then click **Add** to add the claim to the token.
216218

219+
Customization done in the **Attributes & Claims** section can overwrite the optional claims in the **App Registration**.
220+
217221
## Emit claims based on conditions
218222

219223
You can specify the source of a claim based on user type and the group to which the user belongs.
-11.9 KB
Loading

articles/active-directory/manage-apps/disable-user-sign-in-portal.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -26,18 +26,17 @@ In this article, you learn how to prevent users from signing in to an applicatio
2626

2727
To disable user sign-in, you need:
2828

29-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30-
- One of the following roles: An administrator, or owner of the service principal.
29+
- An Azure AD user account. If you don't already have one, you can [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
30+
- One of the following roles: Global Administrator, Cloud Application Administrator, Application Administrator, or owner of the service principal.
3131

3232
## Disable user sign-in
3333

3434
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3535

3636
:::zone pivot="portal"
3737

38-
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator for your directory.
39-
1. Search for and select **Azure Active Directory**.
40-
1. Select **Enterprise applications**.
38+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
39+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
4140
1. Search for the application you want to disable a user from signing in, and select the application.
4241
1. Select **Properties**.
4342
1. Select **No** for **Enabled for users to sign-in?**.
@@ -49,11 +48,11 @@ To disable user sign-in, you need:
4948

5049
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
5150

52-
Ensure you've installed the AzureAD module (use the command `Install-Module -Name AzureAD`). In case you're prompted to install a NuGet module or the new Azure AD V2 PowerShell module, type Y and press ENTER.
51+
Ensure you've installed the AzureAD module (use the command `Install-Module -Name AzureAD`). In case you're prompted to install a NuGet module or the new Azure AD V2 PowerShell module, type Y and press ENTER. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
5352

5453
```PowerShell
5554
# Connect to Azure AD PowerShell
56-
Connect-AzureAD -Scopes "Application.ReadWrite.All"
55+
Connect-AzureAD -Scopes
5756
5857
# The AppId of the app to be disabled
5958
$appId = "{AppId}"
@@ -74,7 +73,7 @@ if ($servicePrincipal) {
7473

7574
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
7675

77-
Ensure you've installed the Microsoft Graph module (use the command `Install-Module Microsoft.Graph`).
76+
Ensure you've installed the Microsoft Graph module (use the command `Install-Module Microsoft.Graph`). You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
7877

7978
```powershell
8079
# Connect to Microsoft Graph PowerShell
@@ -98,7 +97,7 @@ else { $servicePrincipal = New-MgServicePrincipal -AppId $appId –AccountEnabl
9897

9998
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
10099

101-
To disable sign-in to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
100+
To disable sign-in to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
102101

103102
You need to consent to the `Application.ReadWrite.All` permission.
104103

articles/active-directory/manage-apps/manage-application-permissions.md

Lines changed: 11 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.subservice: app-mgmt
99
ms.workload: identity
1010
ms.topic: how-to
11-
ms.date: 03/28/2023
11+
ms.date: 09/04/2023
1212
ms.author: jawoods
1313
ms.reviewer: phsignor
1414
zone_pivot_groups: enterprise-apps-all
@@ -41,34 +41,25 @@ Please see [Restore permissions granted to applications](restore-permissions.md)
4141

4242
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
4343

44-
You can access the Azure portal to view the permissions granted to an app. You can revoke permissions granted by admins for your entire organization, and you can get contextual PowerShell scripts to perform other actions.
44+
You can access the Microsoft Entra admin center to view the permissions granted to an app. You can revoke permissions granted by admins for your entire organization, and you can get contextual PowerShell scripts to perform other actions.
4545

46-
To revoke an application's permissions that have been granted for the entire organization:
46+
To review an application's permissions that have been granted for the entire organization or to a specific user or group:
4747

48-
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the roles listed in the prerequisites section.
49-
1. Select **Azure Active Directory**, and then select **Enterprise applications**.
48+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
49+
1. Browse to **Identity** > **Applications** > **Enterprise applications** > **All applications**.
5050
1. Select the application that you want to restrict access to.
5151
1. Select **Permissions**.
52-
1. The permissions listed in the **Admin consent** tab apply to your entire organization. Choose the permission you would like to remove, select the **...** control for that permission, and then choose **Revoke permission**.
53-
54-
To review an application's permissions:
55-
56-
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the roles listed in the prerequisites section.
57-
1. Select **Azure Active Directory**, and then select **Enterprise applications**.
58-
1. Select the application that you want to restrict access to.
59-
1. Select **Permissions**. In the command bar, select **Review permissions**.
60-
![Screenshot of the review permissions window.](./media/manage-application-permissions/review-permissions.png)
61-
1. Give a reason for why you want to review permissions for the application by selecting any of the options listed after the question, **Why do you want to review permissions for this application?**
62-
63-
Each option generates PowerShell scripts that enable you to control user access to the application and to review permissions granted to the application. For information about how to control user access to an application, see [How to remove a user's access to an application](methods-for-removing-user-access.md)
52+
1. To view permissions that apply to your entire organization, select the **Admin consent** tab. To view permissions granted to a specific user or group, select the **User consent** tab.
53+
1. To view the details of a given permission, select the permission from the list. The **Permission Details** pane opens.
54+
1. To revoke a given permission, choose the permission you would like to revoke, select the **...** control for that permission, and then choose **Revoke permission**.
6455

6556
:::zone-end
6657

6758
:::zone pivot="aad-powershell"
6859

6960
## Review and revoke permissions
7061

71-
Use the following Azure AD PowerShell script to revoke all permissions granted to an application.
62+
Use the following Azure AD PowerShell script to revoke all permissions granted to an application. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
7263

7364
```powershell
7465
Connect-AzureAD
@@ -117,7 +108,7 @@ $assignments | ForEach-Object {
117108

118109
## Review and revoke permissions
119110

120-
Use the following Microsoft Graph PowerShell script to revoke all permissions granted to an application.
111+
Use the following Microsoft Graph PowerShell script to revoke all permissions granted to an application. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
121112

122113
```powershell
123114
Connect-MgGraph -Scopes "Application.ReadWrite.All", "Directory.ReadWrite.All", "DelegatedPermissionGrant.ReadWrite.All", "AppRoleAssignment.ReadWrite.All"
@@ -171,7 +162,7 @@ $spApplicationPermissions = Get-MgServicePrincipalAppRoleAssignedTo -ServicePrin
171162

172163
## Review and revoke permissions
173164

174-
To review permissions, Sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) with one of the roles listed in the prerequisite section.
165+
To review permissions, Sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
175166

176167
You need to consent to the following permissions:
177168

articles/active-directory/manage-apps/review-admin-consent-requests.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,17 +25,16 @@ In this article, you learn how to review and take action on admin consent reques
2525
To review and take action on admin consent requests, you need:
2626

2727
- An Azure account. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
28-
- A designated reviewer with the appropriate role to [review admin consent requests](grant-admin-consent.md#prerequisites).
28+
- A Global Administrator or a designated reviewer with the appropriate role to [review admin consent requests](grant-admin-consent.md#prerequisites).
2929

3030
## Review and take action on admin consent requests
3131

3232
[!INCLUDE [portal updates](~/articles/active-directory/includes/portal-update.md)]
3333

3434
To review the admin consent requests and take action:
3535

36-
1. Sign in to the [Azure portal](https://portal.azure.com) as one of the registered reviewers of the admin consent workflow.
37-
1. Search for and select **Azure Active Directory**.
38-
1. From the navigation menu, select **Enterprise applications**.
36+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator) who is a designated reviewer.
37+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
3938
1. Under **Activity**, select **Admin consent requests**.
4039
1. Select **My Pending** tab to view and act on the pending requests.
4140
1. Select the application that is being requested from the list.

articles/active-directory/manage-apps/whats-new-docs.md

Lines changed: 13 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "What's new in Azure Active Directory application management"
33
description: "New and updated documentation for the Azure Active Directory application management."
4-
ms.date: 08/01/2023
4+
ms.date: 09/04/2023
55
ms.service: active-directory
66
ms.subservice: app-mgmt
77
ms.topic: reference
@@ -15,6 +15,18 @@ manager: CelesteDG
1515

1616
Welcome to what's new in Azure Active Directory (Azure AD) application management documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the application management service, see [What's new in Azure AD](../fundamentals/whats-new.md).
1717

18+
## August 2023
19+
### New articles
20+
21+
- [Manage app consent policies for group owners](manage-group-owner-consent-policies.md) - New how-to guide on how to manage group owner consent policies.
22+
23+
### Updated articles
24+
25+
- [Properties of an enterprise application](application-properties.md) - Updates on the user requirement property
26+
- [Configure group and team owner consent to applications](configure-user-consent-groups.md) - Updates to examples for configuring group and team owner consent
27+
- [Configure how users consent to applications](configure-user-consent.md) - Updates to examples for configuring user consent
28+
- [Manage app consent policies](manage-app-consent-policies.md) - Updates to examples for managing app consent policies
29+
- [Review the application activity report](migrate-adfs-application-activity.md) - Updates to stale local links
1830
## July 2023
1931

2032
### New articles
@@ -49,26 +61,3 @@ The following PowerShell sample was added:
4961
- [Configure Datawiza for Azure AD Multi-Factor Authentication and single sign-on to Oracle EBS](datawiza-sso-mfa-oracle-ebs.md)
5062
- [Tutorial: Configure F5 BIG-IP Access Policy Manager for Kerberos authentication](f5-big-ip-kerberos-advanced.md)
5163
- [Tutorial: Configure F5 BIG-IP Easy Button for Kerberos single sign-on](f5-big-ip-kerberos-easy-button.md)
52-
## May 2023
53-
54-
### New articles
55-
56-
- [Phase 2: Classify apps and plan pilot](migrate-adfs-classify-apps-plan-pilot.md)
57-
- [Phase 1: Discover and scope apps](migrate-adfs-discover-scope-apps.md)
58-
- [Phase 4: Plan management and insights](migrate-adfs-plan-management-insights.md)
59-
- [Phase 3: Plan migration and testing](migrate-adfs-plan-migration-test.md)
60-
- [Represent AD FS security policies in Azure Active Directory: Mappings and examples](migrate-adfs-represent-security-policies.md)
61-
- [SAML-based single sign-on: Configuration and Limitations](migrate-adfs-saml-based-sso.md)
62-
63-
### Updated articles
64-
65-
- [Tutorial: Migrate Okta sync provisioning to Azure AD Connect synchronization](migrate-okta-sync-provisioning.md)
66-
- [Application management videos](app-management-videos.md)
67-
- [Understand the stages of migrating application authentication from AD FS to Azure AD](./migrate-adfs-apps-stages.md)
68-
- [Plan application migration to Azure Active Directory](./migrate-adfs-apps-phases-overview.md)
69-
- [Tutorial: Migrate Okta sync provisioning to Azure AD Connect-based synchronization](./migrate-okta-sync-provisioning.md)
70-
- [Tutorial: Configure F5 BIG-IP Easy Button for SSO to Oracle JDE](f5-big-ip-oracle-jde-easy-button.md)
71-
- [Tutorial: Configure F5 BIG-IP Easy Button for SSO to Oracle PeopleSoft](f5-big-ip-oracle-peoplesoft-easy-button.md)
72-
- [Tutorial: Configure Cloudflare with Azure Active Directory for secure hybrid access](./cloudflare-integration.md)
73-
- [Tutorial: Configure F5 BIG-IP Easy Button for SSO to SAP ERP](f5-big-ip-sap-erp-easy-button.md)
74-
- [Tutorial: Migrate Okta federation to Azure Active Directory-managed authentication](migrate-okta-federation.md)

0 commit comments

Comments
 (0)