You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/includes/web-app-client-credentials.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,4 +72,8 @@ Instead of a client secret, you can provide a client certificate. The following
72
72
}
73
73
```
74
74
75
-
*Microsoft.Identity.Web* provides several ways to describe certificates, both by configuration or by code. For details, see [Microsoft.Identity.Web - Using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Using-certificates) on GitHub.
75
+
> [!WARNING]
76
+
>
77
+
> If you forget to change the `Scopes` to an array, when you try to use the `IDownstreamApi` the scopes will appear null, and `IDownstreamApi` will attempt an anonymous (unauthenticated) call to the downstream API, which will result in a `401/unauthenticated`.
78
+
79
+
*Microsoft.Identity.Web* provides several ways to describe certificates, both by configuration or by code. For details, see [Microsoft.Identity.Web - Using certificates](https://github.com/AzureAD/microsoft-identity-web/wiki/Using-certificates) on GitHub.
Copy file name to clipboardExpand all lines: articles/active-directory/develop/saml-claims-customization.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -210,10 +210,14 @@ When the following conditions occur after **Add** or **Run test** is selected, a
210
210
211
211
## Add the UPN claim to SAML tokens
212
212
213
-
The `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn` claim is part of the [SAML restricted claim set](reference-claims-mapping-policy-type.md), so you can't add it in the **Attributes & Claims** section. As a workaround, you can add it as an [optional claim](./optional-claims.md) through **App registrations**in the Azure portal.
213
+
The `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn` claim is part of the [SAML restricted claim set](reference-claims-mapping-policy-type.md#saml-restricted-claim-set). If you have custom signing key configured, you can add it in the **Attributes & Claims**section.
214
214
215
+
In case there is no custom signing key configured, please refer to [SAML Restricted claim set](reference-claims-mapping-policy-type.md#saml-restricted-claim-set). You can add it as an [optional claim](./optional-claims.md) through **App registrations** in the Azure portal.
216
+
215
217
Open the application in **App registrations**, select **Token configuration**, and then select **Add optional claim**. Select the **SAML** token type, choose **upn** from the list, and then click **Add** to add the claim to the token.
216
218
219
+
Customization done in the **Attributes & Claims** section can overwrite the optional claims in the **App Registration**.
220
+
217
221
## Emit claims based on conditions
218
222
219
223
You can specify the source of a claim based on user type and the group to which the user belongs.
1. Sign in to the [Azure portal](https://portal.azure.com) as the global administrator for your directory.
39
-
1. Search for and select **Azure Active Directory**.
40
-
1. Select **Enterprise applications**.
38
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. Search for the application you want to disable a user from signing in, and select the application.
42
41
1. Select **Properties**.
43
42
1. Select **No** for **Enabled for users to sign-in?**.
@@ -49,11 +48,11 @@ To disable user sign-in, you need:
49
48
50
49
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
51
50
52
-
Ensure you've installed the AzureAD module (use the command `Install-Module -Name AzureAD`). In case you're prompted to install a NuGet module or the new Azure AD V2 PowerShell module, type Y and press ENTER.
51
+
Ensure you've installed the AzureAD module (use the command `Install-Module -Name AzureAD`). In case you're prompted to install a NuGet module or the new Azure AD V2 PowerShell module, type Y and press ENTER. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
76
75
77
-
Ensure you've installed the Microsoft Graph module (use the command `Install-Module Microsoft.Graph`).
76
+
Ensure you've installed the Microsoft Graph module (use the command `Install-Module Microsoft.Graph`). You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
You may know the AppId of an app that doesn't appear on the Enterprise apps list. For example, you may have deleted the app or the service principal hasn't yet been created due to the app being preauthorized by Microsoft. You can manually create the service principal for the app and then disable it by using the following Microsoft Graph PowerShell cmdlet.
100
99
101
-
To disable sign-in to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer)with one of the roles listed in the prerequisite section.
100
+
To disable sign-in to an application, sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer)as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
102
101
103
102
You need to consent to the `Application.ReadWrite.All` permission.
You can access the Azure portal to view the permissions granted to an app. You can revoke permissions granted by admins for your entire organization, and you can get contextual PowerShell scripts to perform other actions.
44
+
You can access the Microsoft Entra admin center to view the permissions granted to an app. You can revoke permissions granted by admins for your entire organization, and you can get contextual PowerShell scripts to perform other actions.
45
45
46
-
To revoke an application's permissions that have been granted for the entire organization:
46
+
To review an application's permissions that have been granted for the entire organization or to a specific user or group:
47
47
48
-
1. Sign in to the [Azure portal](https://portal.azure.com)using one of the roles listed in the prerequisites section.
49
-
1.Select **Azure Active Directory**, and then select **Enterprise applications**.
48
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com)as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
1. Select the application that you want to restrict access to.
51
51
1. Select **Permissions**.
52
-
1. The permissions listed in the **Admin consent** tab apply to your entire organization. Choose the permission you would like to remove, select the **...** control for that permission, and then choose **Revoke permission**.
53
-
54
-
To review an application's permissions:
55
-
56
-
1. Sign in to the [Azure portal](https://portal.azure.com) using one of the roles listed in the prerequisites section.
57
-
1. Select **Azure Active Directory**, and then select **Enterprise applications**.
58
-
1. Select the application that you want to restrict access to.
59
-
1. Select **Permissions**. In the command bar, select **Review permissions**.
60
-

61
-
1. Give a reason for why you want to review permissions for the application by selecting any of the options listed after the question, **Why do you want to review permissions for this application?**
62
-
63
-
Each option generates PowerShell scripts that enable you to control user access to the application and to review permissions granted to the application. For information about how to control user access to an application, see [How to remove a user's access to an application](methods-for-removing-user-access.md)
52
+
1. To view permissions that apply to your entire organization, select the **Admin consent** tab. To view permissions granted to a specific user or group, select the **User consent** tab.
53
+
1. To view the details of a given permission, select the permission from the list. The **Permission Details** pane opens.
54
+
1. To revoke a given permission, choose the permission you would like to revoke, select the **...** control for that permission, and then choose **Revoke permission**.
64
55
65
56
:::zone-end
66
57
67
58
:::zone pivot="aad-powershell"
68
59
69
60
## Review and revoke permissions
70
61
71
-
Use the following Azure AD PowerShell script to revoke all permissions granted to an application.
62
+
Use the following Azure AD PowerShell script to revoke all permissions granted to an application. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
Use the following Microsoft Graph PowerShell script to revoke all permissions granted to an application.
111
+
Use the following Microsoft Graph PowerShell script to revoke all permissions granted to an application. You need to sign in as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
To review permissions, Sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer)with one of the roles listed in the prerequisite section.
165
+
To review permissions, Sign in to [Graph Explorer](https://developer.microsoft.com/graph/graph-explorer)as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
To review the admin consent requests and take action:
35
35
36
-
1. Sign in to the [Azure portal](https://portal.azure.com) as one of the registered reviewers of the admin consent workflow.
37
-
1. Search for and select **Azure Active Directory**.
38
-
1. From the navigation menu, select **Enterprise applications**.
36
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator) who is a designated reviewer.
37
+
1. Browse to **Identity** > **Applications** > **Enterprise applications**.
39
38
1. Under **Activity**, select **Admin consent requests**.
40
39
1. Select **My Pending** tab to view and act on the pending requests.
41
40
1. Select the application that is being requested from the list.
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/whats-new-docs.md
+13-24Lines changed: 13 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: "What's new in Azure Active Directory application management"
3
3
description: "New and updated documentation for the Azure Active Directory application management."
4
-
ms.date: 08/01/2023
4
+
ms.date: 09/04/2023
5
5
ms.service: active-directory
6
6
ms.subservice: app-mgmt
7
7
ms.topic: reference
@@ -15,6 +15,18 @@ manager: CelesteDG
15
15
16
16
Welcome to what's new in Azure Active Directory (Azure AD) application management documentation. This article lists new docs that have been added and those that have had significant updates in the last three months. To learn what's new with the application management service, see [What's new in Azure AD](../fundamentals/whats-new.md).
17
17
18
+
## August 2023
19
+
### New articles
20
+
21
+
-[Manage app consent policies for group owners](manage-group-owner-consent-policies.md) - New how-to guide on how to manage group owner consent policies.
22
+
23
+
### Updated articles
24
+
25
+
-[Properties of an enterprise application](application-properties.md) - Updates on the user requirement property
26
+
-[Configure group and team owner consent to applications](configure-user-consent-groups.md) - Updates to examples for configuring group and team owner consent
27
+
-[Configure how users consent to applications](configure-user-consent.md) - Updates to examples for configuring user consent
28
+
-[Manage app consent policies](manage-app-consent-policies.md) - Updates to examples for managing app consent policies
29
+
-[Review the application activity report](migrate-adfs-application-activity.md) - Updates to stale local links
18
30
## July 2023
19
31
20
32
### New articles
@@ -49,26 +61,3 @@ The following PowerShell sample was added:
49
61
-[Configure Datawiza for Azure AD Multi-Factor Authentication and single sign-on to Oracle EBS](datawiza-sso-mfa-oracle-ebs.md)
50
62
-[Tutorial: Configure F5 BIG-IP Access Policy Manager for Kerberos authentication](f5-big-ip-kerberos-advanced.md)
51
63
-[Tutorial: Configure F5 BIG-IP Easy Button for Kerberos single sign-on](f5-big-ip-kerberos-easy-button.md)
52
-
## May 2023
53
-
54
-
### New articles
55
-
56
-
-[Phase 2: Classify apps and plan pilot](migrate-adfs-classify-apps-plan-pilot.md)
57
-
-[Phase 1: Discover and scope apps](migrate-adfs-discover-scope-apps.md)
58
-
-[Phase 4: Plan management and insights](migrate-adfs-plan-management-insights.md)
59
-
-[Phase 3: Plan migration and testing](migrate-adfs-plan-migration-test.md)
60
-
-[Represent AD FS security policies in Azure Active Directory: Mappings and examples](migrate-adfs-represent-security-policies.md)
61
-
-[SAML-based single sign-on: Configuration and Limitations](migrate-adfs-saml-based-sso.md)
62
-
63
-
### Updated articles
64
-
65
-
-[Tutorial: Migrate Okta sync provisioning to Azure AD Connect synchronization](migrate-okta-sync-provisioning.md)
0 commit comments