Skip to content

Commit 7d0241d

Browse files
committed
Merge branch 'main' into release-preview-apim-skuv2
2 parents 708d5e6 + 263b466 commit 7d0241d

File tree

213 files changed

+2309
-1185
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

213 files changed

+2309
-1185
lines changed

.openpublishing.redirection.app-service.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,21 @@
3939
"source_path_from_root": "/articles/app-service/app-service-web-restore-snapshots.md",
4040
"redirect_url": "/azure/app-service/manage-backup",
4141
"redirect_document_id": false
42+
},
43+
{
44+
"source_path_from_root": "/articles/app-service/networking/app-gateway-with-service-endpoints.md",
45+
"redirect_url": "/azure/app-service/overview-app-gateway-integration",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path_from_root": "/articles/app-service/networking/nat-gateway-integration.md",
50+
"redirect_url": "/azure/app-service/overview-nat-gateway-integration",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path_from_root": "/articles/app-service/networking/private-endpoint.md",
55+
"redirect_url": "/azure/app-service/overview-private-endpoint",
56+
"redirect_document_id": false
4257
}
4358
]
4459
}

articles/active-directory-b2c/custom-policies-series-validate-user-input.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
1212
ms.custom: b2c-docs-improvements
13-
ms.date: 01/30/2023
13+
ms.date: 10/05/2023
1414
ms.author: kengaderdus
1515
ms.reviewer: yoelh
1616
ms.subservice: B2C
@@ -147,7 +147,7 @@ While the *Predicates* define the validation to check against a claim type, the
147147
</ClaimType>
148148
```
149149

150-
1. Add a `Predicates` element as a child of `BuildingBlocks` section by using the following code:
150+
1. Add a `Predicates` element as a child of `BuildingBlocks` section by using the following code. You add the `Predicates` element below the `ClaimsSchema` element:
151151

152152
```xml
153153
<Predicates>
@@ -210,7 +210,7 @@ While the *Predicates* define the validation to check against a claim type, the
210210

211211
We've defined several rules, which when put together described an acceptable password. Next, you can group predicates, to form a set of password policies that you can use in your policy.
212212

213-
1. Add a `PredicateValidations` element as a child of `BuildingBlocks` section by using the following code:
213+
1. Add a `PredicateValidations` element as a child of `BuildingBlocks` section by using the following code. You add the `PredicateValidations` element below the `Predicates` element:
214214

215215
```xml
216216
<PredicateValidations>

articles/active-directory/app-proxy/application-proxy-release-version-history.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,13 @@ June 20, 2023: Released for download. This version is only available for install
4242
- Fixed dropping of “Secure” and “HttpOnly” attributes on the cookies passed by backend servers when there are trailing spaces in these attributes.
4343
- Fixed services crash when back-end server of an application sets "Set-Cookie" header with empty value.
4444

45+
> [!IMPORTANT]
46+
> **.NET Framework**
47+
>
48+
> You must have .NET version 4.7.1 or higher to install, or upgrade, Application Proxy version 1.5.3437.0 or later. Windows Server 2012 R2 and Windows Server 2016 may not have this by default.
49+
>
50+
> See [How to: Determine which .NET Framework versions are installed](/dotnet/framework/migration-guide/how-to-determine-which-versions-are-installed) for more information.
51+
4552
## 1.5.2846.0
4653

4754
### Release status

articles/active-directory/authentication/certificate-based-authentication-federation-android.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: has-azure-ad-ps-ref
99
ms.topic: how-to
10-
ms.date: 09/30/2022
10+
ms.date: 08/14/2023
1111

1212
ms.author: justinha
1313
author: justinha
@@ -63,11 +63,11 @@ As a best practice, you should update your organization's AD FS error pages with
6363

6464
For more information, see [Customizing the AD FS Sign-in Pages](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn280950(v=ws.11)).
6565

66-
Office apps with modern authentication enabled send '*prompt=login*' to Microsoft Entra ID in their request. By default, Microsoft Entra ID translates '*prompt=login*' in the request to AD FS as '*wauth=usernamepassworduri*' (asks AD FS to do U/P Auth) and '*wfresh=0*' (asks AD FS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, you need to modify the default Microsoft Entra behavior. Set the '*PromptLoginBehavior*' in your federated domain settings to '*Disabled*'.
67-
You can use the [MSOLDomainFederationSettings](/powershell/module/msonline/set-msoldomainfederationsettings) cmdlet to perform this task:
66+
Office apps with modern authentication enabled send '*prompt=login*' to Azure AD in their request. By default, Azure AD translates '*prompt=login*' in the request to AD FS as '*wauth=usernamepassworduri*' (asks AD FS to do U/P Auth) and '*wfresh=0*' (asks AD FS to ignore SSO state and do a fresh authentication). If you want to enable certificate-based authentication for these apps, you need to modify the default Azure AD behavior. Set the '*PromptLoginBehavior*' in your federated domain settings to '*Disabled*'.
67+
You can use Set-MgDomainFederationConfiguration to perform this task:
6868

6969
```powershell
70-
Set-MSOLDomainFederationSettings -domainname <domain> -PromptLoginBehavior Disabled
70+
Set-MgDomainFederationConfiguration -domainname <domain> -PromptLoginBehavior Disabled
7171
```
7272

7373
## Exchange ActiveSync clients support

articles/active-directory/external-identities/tenant-restrictions-v2.md

Lines changed: 48 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: how-to
8-
ms.date: 09/12/2023
8+
ms.date: 10/04/2023
99

1010
ms.author: mimart
1111
author: msmimart
@@ -80,6 +80,7 @@ The following table compares the features in each version.
8080
| |Tenant restrictions v1 |Tenant restrictions v2 |
8181
|----------------------|---------|---------|
8282
|**Policy enforcement** | The corporate proxy enforces the tenant restriction policy in the Microsoft Entra ID control plane. | Options: <br></br>- Universal tenant restrictions in Global Secure Access (preview), which uses policy signaling to tag all traffic, providing both authentication and data plane support on all platforms. <br></br>- Authentication plane-only protection, where the corporate proxy sets tenant restrictions v2 signals on all traffic. <br></br>- Windows device management, where devices are configured to point Microsoft traffic to the tenant restriction policy, and the policy is enforced in the cloud. |
83+
|**Policy enforcement limitation** | Manage corporate proxies by adding tenants to the Microsoft Entra ID traffic allowlist. The character limit of the header value in Restrict-Access-To-Tenants: `<allowed-tenant-list>` limits the number of tenants that can be added. | Managed by a cloud policy in the cross-tenant access policy. A partner policy is created for each external tenant. Currently, the configuration for all external tenants is contained in one policy with a 25KB size limit. |
8384
|**Malicious tenant requests** | Microsoft Entra ID blocks malicious tenant authentication requests to provide authentication plane protection. | Microsoft Entra ID blocks malicious tenant authentication requests to provide authentication plane protection. |
8485
|**Granularity** | Limited. | Tenant, user, group, and application granularity. (User-level granularity isn't supported with Microsoft Accounts.) |
8586
|**Anonymous access** | Anonymous access to Teams meetings and file sharing is allowed. | Anonymous access to Teams meetings is blocked. Access to anonymously shared resources (“Anyone with the link”) is blocked. |
@@ -89,9 +90,6 @@ The following table compares the features in each version.
8990
|**Portal support** |No user interface in the Microsoft Entra admin center for configuring the policy. | User interface available in the Microsoft Entra admin center for setting up the cloud policy. |
9091
|**Unsupported apps** | N/A | Block unsupported app use with Microsoft endpoints by using Windows Defender Application Control (WDAC) or Windows Firewall (for example, for Chrome, Firefox, and so on). See [Block Chrome, Firefox and .NET applications like PowerShell](#block-chrome-firefox-and-net-applications-like-powershell). |
9192

92-
### Migrate tenant restrictions v1 policies to v2
93-
94-
When using tenant restrictions v2 to manage access for your Windows device users, we recommend also configuring your corporate proxy to enforce tenant restrictions v2 to manage other devices and apps in your corporate network. Although configuring tenant restrictions on your corporate proxy doesn't provide data plane protection, it provides authentication plane protection. For details, see [Set up tenant restrictions v2 on your corporate proxy](#option-2-set-up-tenant-restrictions-v2-on-your-corporate-proxy).
9593

9694
### Tenant restrictions vs. inbound and outbound settings
9795

@@ -107,7 +105,7 @@ Think of the different cross-tenant access settings this way:
107105

108106
When your users need access to external organizations and apps, we recommend enabling tenant restrictions to block external accounts and use B2B collaboration instead. B2B collaboration gives you the ability to:
109107

110-
- Use Conditional Access and force multi-factor authentication for B2B collaboration users.
108+
- Use Conditional Access and force multifactor authentication for B2B collaboration users.
111109
- Manage inbound and outbound access.
112110
- Terminate sessions and credentials when a B2B collaboration user's employment status changes or their credentials are breached.
113111
- Use sign-in logs to view details about the B2B collaboration user.
@@ -345,7 +343,7 @@ Universal tenant restrictions v2 as part of [Microsoft Entra Global Secure Acces
345343

346344
### Option 2: Set up tenant restrictions v2 on your corporate proxy
347345

348-
Tenant restrictions v2 policies can't be directly enforced on non-Windows 10, Windows 11, or Windows Server 2022 devices, such as Mac computers, mobile devices, unsupported Windows applications, and Chrome browsers. To ensure sign-ins are restricted on all devices and apps in your corporate network, configure your corporate proxy to enforce tenant restrictions v2. Although configuring tenant restrictions on your corporate proxy don't provide data plane protection, it does provide authentication plane protection.
346+
Tenant restrictions v2 policies can't be directly enforced on non-Windows 10, Windows 11, or Windows Server 2022 devices, such as Mac computers, mobile devices, unsupported Windows applications, and Chrome browsers. To ensure sign-ins are restricted on all devices and apps in your corporate network, configure your corporate proxy to enforce tenant restrictions v2. Although configuring tenant restrictions on your corporate proxy doesn't provide data plane protection, it does provide authentication plane protection.
349347

350348
> [!IMPORTANT]
351349
> If you've previously set up tenant restrictions, you'll need to stop sending `restrict-msa` to login.live.com. Otherwise, the new settings will conflict with your existing instructions to the MSA login service.
@@ -368,6 +366,50 @@ Tenant restrictions v2 policies can't be directly enforced on non-Windows 10, Wi
368366

369367
This header enforces your tenant restrictions v2 policy on all sign-ins on your network. This header doesn't block anonymous access to Teams meetings, SharePoint files, or other resources that don't require authentication.
370368

369+
### Migrate tenant restrictions v1 policies to v2
370+
371+
On your corporate proxy, you can move from tenant restrictions v1 to tenant restrictions v2 by changing this tenant restrictions v1 header:
372+
373+
`Restrict-Access-To-Tenants: <allowed-tenant-list>`
374+
375+
to this tenant restrictions v2 header:
376+
377+
`sec-Restrict-Tenant-Access-Policy: <DirectoryID>:<policyGUID>`
378+
379+
where `<DirectoryID>` is your Azure AD tenant ID and `<policyGUID>` is the object ID for your cross-tenant access policy.
380+
381+
#### Tenant restrictions v1 settings on the corporate proxy
382+
383+
The following example shows an existing tenant restrictions V1 setting on the corporate proxy:
384+
385+
`Restrict-Access-To-Tenants: contoso.com, fabrikam.com, dogfood.com sec-Restrict-Tenant-Access-Policy: restrict-msa`
386+
387+
[Learn more](../manage-apps/tenant-restrictions.md) about tenant restrictions v1.
388+
389+
#### Tenant restrictions v2 settings on the corporate proxy
390+
391+
You can configure the corporate proxy to enable client-side tagging of the tenant restrictions V2 header by using the following corporate proxy setting:
392+
393+
`sec-Restrict-Tenant-Access-Policy: <DirectoryID>:<policyGUID>`
394+
395+
where `<DirectoryID>` is your Azure AD tenant ID and `<policyGUID>` is the object ID for your cross-tenant access policy. For details, see [Set up tenant restrictions v2 on your corporate proxy](#option-2-set-up-tenant-restrictions-v2-on-your-corporate-proxy)
396+
397+
You can configure server-side cloud tenant restrictions v2 policies by following the steps at [Step 2: Configure tenant restrictions v2 for specific partners](#step-2-configure-tenant-restrictions-v2-for-specific-partners). Be sure to follow these guidelines:
398+
399+
- Keep the tenant restrictions v2 default policy that blocks all external tenant access using foreign identities (for example, `[email protected]`).
400+
401+
- Create a partner tenant policy for each tenant listed in your v1 allowlist by following the steps at [Step 2: Configure tenant restrictions v2 for specific partners](#step-2-configure-tenant-restrictions-v2-for-specific-partners).
402+
403+
- Allow only specific users to access specific applications. This design increases your security posture by limiting access to necessary users only.
404+
405+
- Tenant restrictions v2 policies treat MSA as a partner tenant. Create a partner tenant configuration for MSA by following the steps in [Step 2: Configure tenant restrictions v2 for specific partners](#step-2-configure-tenant-restrictions-v2-for-specific-partners). Because user-level assignment isn't available for MSA tenants, the policy applies to all MSA users. However, application-level granularity is available, and you should limit the applications that MSA or consumer accounts can access to only those applications that are necessary.
406+
407+
> [!NOTE]
408+
>Blocking the MSA tenant will not block user-less traffic for devices, including:
409+
>
410+
>- Traffic for Autopilot, Windows Update, and organizational telemetry.
411+
>- B2B authentication of consumer accounts, or "passthrough" authentication, where Azure apps and Office.com apps use Azure AD to sign in consumer users in a consumer context.
412+
371413
#### Tenant restrictions v2 with no support for break and inspect
372414

373415
For non-Windows platforms, you can break and inspect traffic to add the tenant restrictions v2 parameters into the header via proxy. However, some platforms don't support break and inspect, so tenant restrictions v2 don't work. For these platforms, the following features of Microsoft Entra ID can provide protection:

articles/active-directory/manage-apps/migrate-okta-federation.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,9 @@ In this tutorial, learn to federate Office 365 tenants with Okta for single sign
1919

2020
You can migrate federation to Microsoft Entra ID in a staged manner to ensure a good authentication experience for users. In a staged migration, you can test reverse federation access to remaining Okta SSO applications.
2121

22+
>[!NOTE]
23+
>Scenario described in this tutorial is only one possible way of implementing the migration. You should try to adapt the information to your specific setup.
24+
2225
## Prerequisites
2326

2427
- An Office 365 tenant federated to Okta for SSO

0 commit comments

Comments
 (0)