Skip to content

Commit 7da0afe

Browse files
committed
Merge branch 'cosmos-dileepraotv-rbac-cmk' of https://github.com/seesharprun/azure-docs-pr into cosmos-dileepraotv-rbac-cmk
2 parents 994ff94 + d8ef80d commit 7da0afe

File tree

39 files changed

+178
-124
lines changed

39 files changed

+178
-124
lines changed

articles/active-directory-b2c/saml-identity-provider-technical-profile.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ manager: CelesteDG
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: reference
12-
ms.date: 01/11/2022
12+
ms.date: 01/05/2023
1313
ms.author: kengaderdus
1414
ms.subservice: B2C
1515
---
@@ -31,7 +31,7 @@ Each SAML identity provider has different steps to expose and set the service pr
3131
The following example shows a URL address to the SAML metadata of an Azure AD B2C technical profile:
3232

3333
```
34-
https://your-tenant-name.b2clogin.com/your-tenant-name/your-policy/samlp/metadata?idptp=your-technical-profile
34+
https://your-tenant-name.b2clogin.com/your-tenant-name.onmicrosoft.com/your-policy/samlp/metadata?idptp=your-technical-profile
3535
```
3636

3737
Replace the following values:

articles/active-directory/authentication/how-to-mfa-registration-campaign.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: authentication
88
ms.custom: ignite-2022
99
ms.topic: conceptual
10-
ms.date: 06/23/2022
10+
ms.date: 01/05/2023
1111

1212
ms.author: justinha
1313
author: mjsantani
@@ -305,6 +305,9 @@ Yes. If they have been scoped for the nudge using the policy.
305305

306306
It's the same as snoozing.
307307

308+
**Why don’t some users see a nudge when there is a conditional access policy for "Register security information"?**
309+
310+
A nudge won't appear if a user is in scope for a conditional access policy that blocks access to the **Register security information** page.
308311

309312
## Next steps
310313

articles/active-directory/authentication/troubleshoot-sspr-writeback.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: troubleshooting
9-
ms.date: 02/22/2022
9+
ms.date: 01/05/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -157,7 +157,7 @@ The following more specific issues may occur with password writeback. If you hav
157157
| Federated, pass-through authentication, or password-hash-synchronized users who attempt to reset their passwords, see an error after they submit their password. The error indicates that there was a service problem. <br> <br> In addition to this problem, during password reset operations, you might see an error in your event logs from the Azure AD Connect service indicating an "Object could not be found" error. | This error usually indicates that the sync engine is unable to find either the user object in the Azure AD connector space or the linked metaverse (MV) or Azure AD connector space object. <br> <br> To troubleshoot this problem, make sure that the user is indeed synchronized from on-premises to Azure AD via the current instance of Azure AD Connect and inspect the state of the objects in the connector spaces and MV. Confirm that the Active Directory Certificate Services (AD CS) object is connected to the MV object via the "Microsoft.InfromADUserAccountEnabled.xxx" rule.|
158158
| Federated, pass-through authentication, or password-hash-synchronized users who attempt to reset their passwords see an error after they submit their password. The error indicates that there was a service problem. <br> <br> In addition to this problem, during password reset operations, you might see an error in your event logs from the Azure AD Connect service that indicates that there's a "Multiple matches found" error. | This indicates that the sync engine detected that the MV object is connected to more than one AD CS object via "Microsoft.InfromADUserAccountEnabled.xxx". This means that the user has an enabled account in more than one forest. This scenario isn't supported for password writeback. |
159159
| Password operations fail with a configuration error. The application event log contains Azure AD Connect error 6329 with the text "0x8023061f (The operation failed because password synchronization is not enabled on this Management Agent)". | This error occurs if the Azure AD Connect configuration is changed to add a new Active Directory forest (or to remove and readd an existing forest) after the password writeback feature has already been enabled. Password operations for users in these recently added forests fail. To fix the problem, disable and then re-enable the password writeback feature after the forest configuration changes have been completed.
160-
| SSPR_0029: We are unable to reset your password due to an error in your on-premises configuration. Please contact your admin and ask them to investigate. | Problem: Password writeback has been enabled following all of the required steps, but when attempting to change a password you receive "SSPR_0029: Your organization hasn’t properly set up the on-premises configuration for password reset." Checking the event logs on the Azure AD Connect system shows that the management agent credential was denied access.Possible Solution: Use RSOP on the Azure AD Connect system and your domain controllers to see if the policy "Network access: Restrict clients allowed to make remote calls to SAM" found under Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options is enabled. Edit the policy to include the MSOL_XXXXXXX management account as an allowed user. |
160+
| SSPR_0029: We are unable to reset your password due to an error in your on-premises configuration. Please contact your admin and ask them to investigate. | Problem: Password writeback has been enabled following all of the required steps, but when attempting to change a password you receive "SSPR_0029: Your organization hasn’t properly set up the on-premises configuration for password reset." Checking the event logs on the Azure AD Connect system shows that the management agent credential was denied access.Possible Solution: Use RSOP on the Azure AD Connect system and your domain controllers to see if the policy "Network access: Restrict clients allowed to make remote calls to SAM" found under Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options is enabled. Edit the policy to include the MSOL_XXXXXXX management account as an allowed user. For more information, see [Troubleshoot error SSPR_0029: Your organization hasn't properly set up the on-premises configuration for password reset](/troubleshoot/azure/active-directory/password-writeback-error-code-sspr-0029).|
161161

162162
## Password writeback event log error codes
163163

articles/active-directory/develop/howto-configure-publisher-domain.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,24 +2,26 @@
22
title: Configure an app's publisher domain
33
description: Learn how to configure an app's publisher domain to let users know where their information is being sent.
44
services: active-directory
5-
author: rwike77
5+
author: OwenRichards1
66
manager: CelesteDG
77

88
ms.service: active-directory
99
ms.subservice: develop
1010
ms.topic: how-to
1111
ms.workload: identity
12-
ms.date: 11/11/2022
13-
ms.author: ryanwi
12+
ms.date: 01/05/2023
13+
ms.author: owenrichards
1414
ms.reviewer: xurobert, brianokoyo
1515
ms.custom: contperf-fy21q4, aaddev
1616
---
1717

1818
# Configure an app's publisher domain
1919

20-
An app’s publisher domain informs users where their information is being sent. The publisher domain also acts as an input or prerequisite for [publisher verification](publisher-verification-overview.md).
20+
An app’s publisher domain informs users where their information is being sent. The publisher domain also acts as an input or prerequisite for [publisher verification](publisher-verification-overview.md). Depending on when the app was registered and the status of the Publisher Verification, it would be displayed directly to the user on the [application's consent prompt](application-consent-experience.md). An application’s publisher domain is displayed to users (depending on the state of Publisher Verification) on the consent UX to let users know where their information is being sent for trustworthiness.
2121

22-
In an app's [consent prompt](application-consent-experience.md), either the publisher domain or the publisher verification status appears. Which information is shown depends on whether the app is a [multitenant app](/azure/architecture/guide/multitenant/overview), when the app was registered, and the app's publisher verification status.
22+
In an app's consent prompt, either the publisher domain or the publisher verification status appears. Which information is shown depends on whether the app is a [multitenant app](/azure/architecture/guide/multitenant/overview), when the app was registered, and the app's publisher verification status.
23+
24+
## Understand multitenant apps
2325

2426
A *multitenant app* is an app that supports user accounts that are outside a single organizational directory. For example, a multitenant app might support all Azure Active Directory (Azure AD) work or school accounts, or it might support both Azure AD work or school accounts and personal Microsoft accounts.
2527

articles/active-directory/reports-monitoring/concept-all-sign-ins.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
88
ms.topic: conceptual
99
ms.workload: identity
1010
ms.subservice: report-monitor
11-
ms.date: 11/04/2022
11+
ms.date: 01/05/2023
1212
ms.author: sarahlipsey
1313
ms.reviewer: besiler
1414
ms.collection: M365-identity-device-management
@@ -41,6 +41,9 @@ To access the sign-ins log for a tenant, you must have one of the following role
4141
- Global Reader
4242
- Reports Reader
4343

44+
>[!NOTE]
45+
>You might need conditional access administrator role to see applied conditional access policies in the sign-ins log.
46+
4447
The sign-in activity report is available in [all editions of Azure AD](reference-reports-data-retention.md#how-long-does-azure-ad-store-the-data). If you have an Azure Active Directory P1 or P2 license, you can access the sign-in activity report through the Microsoft Graph API. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure Active Directory edition. It will take a couple of days for the data to show up in Graph after you upgrade to a premium license with no data activities before the upgrade.
4548

4649
**To access the Azure AD sign-ins log preview:**
60.5 KB
Loading
80.2 KB
Loading
-77.6 KB
Loading
56.5 KB
Loading

articles/active-directory/saas-apps/opentext-fax-tutorial.md

Lines changed: 22 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 01/05/2023
1313
ms.author: jeedes
1414

1515
---
@@ -27,15 +27,16 @@ In this tutorial, you'll learn how to integrate OpenText XM Fax and XM SendSecur
2727
To get started, you need the following items:
2828

2929
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
30-
* OpenText XM Fax and XM SendSecure single sign-on (SSO) enabled subscription.
31-
* Along with Cloud Application Administrator, Application Administrator can also add or manage applications in Azure AD.
30+
* Azure AD Cloud Application Administrator or Application Administrator role.
3231
For more information, see [Azure built-in roles](../roles/permissions-reference.md).
32+
* OpenText XM Fax and XM SendSecure subscription.
33+
* OpenText XM Fax and XM SendSecure administrator account.
3334

3435
## Scenario description
3536

3637
In this tutorial, you configure and test Azure AD SSO in a test environment.
3738

38-
* OpenText XM Fax and XM SendSecure supports **SP** initiated SSO.
39+
* OpenText XM Fax and XM SendSecure supports **SP-initiated** SSO.
3940

4041
> [!NOTE]
4142
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
@@ -98,9 +99,9 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9899

99100
| **Sign-on URL** |
100101
|-------------|
101-
| `https://login.xmedius.com/` |
102-
| `https://login.xmedius.eu/` |
103-
| `https://login.xmedius.ca/` |
102+
| `https://login.xmedius.com/{account}` |
103+
| `https://login.xmedius.eu/{account}` |
104+
| `https://login.xmedius.ca/{account}` |
104105

105106
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
106107

@@ -112,19 +113,19 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
112113

113114
### Create an Azure AD test user
114115

115-
In this section, you'll create a test user in the Azure portal called B.Simon.
116+
In this section, you'll create a test user in the Azure portal called B.Simon:
116117

117118
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
118119
1. Select **New user** at the top of the screen.
119120
1. In the **User** properties, follow these steps:
120121
1. In the **Name** field, enter `B.Simon`.
121-
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
122+
1. In the **User name** field, enter the user name in the following format: [email protected]. For example, `[email protected]`.
122123
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
123124
1. Click **Create**.
124125

125126
### Assign the Azure AD test user
126127

127-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to OpenText XM Fax and XM SendSecure.
128+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to OpenText XM Fax and XM SendSecure:
128129

129130
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
130131
1. In the applications list, select **OpenText XM Fax and XM SendSecure**.
@@ -144,28 +145,33 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
144145

145146
1. Provide the following required information:
146147

147-
a. In the **Sign In URL** textbox, paste the **Login URL** value which you have copied from the Azure portal.
148+
a. In the **Issuer (Identity Provider)** textbox, paste the **Azure AD Identifier** value which you have copied from the Azure portal.
149+
150+
b. In the **Sign In URL** textbox, paste the **Login URL** value which you have copied from the Azure portal.
148151

149-
b. Open the downloaded **Certificate (Base64)** from the Azure portal into Notepad and paste the content into the **X.509 Signing Certificate** textbox.
152+
c. Open the downloaded **Certificate (Base64)** from the Azure portal into Notepad and paste the content into the **X.509 Signing Certificate** textbox.
150153

151-
c. click **Save**.
154+
d. click **Save**.
152155

153156
> [!NOTE]
154157
> Keep the fail-safe URL (`https://login.[domain]/[account]/no-sso`) provided at the bottom of the SSO configuration section, it will allow you to log in using your XM Cloud account credentials if you lock yourself after SSO activation.
155158
156159
### Create OpenText XM Fax and XM SendSecure test user
157160

158-
In this section, you create a user called Britta Simon at OpenText XM Fax and XM SendSecure. Work with [OpenText XM Fax and XM SendSecure support team](mailto:[email protected]) to add the users in the OpenText XM Fax and XM SendSecure platform. Users must be created and activated before you use single sign-on.
161+
Create a user called Britta Simon at OpenText XM Fax and XM SendSecure. Make sure the email is set to "[email protected]".
162+
163+
> [!NOTE]
164+
> Users must be created and activated before you use single sign-on.
159165
160166
## Test SSO
161167

162-
In this section, you test your Azure AD single sign-on configuration with following options.
168+
In this section, you test your Azure AD single sign-on configuration with the following options.
163169

164170
* Click on **Test this application** in Azure portal. This will redirect to OpenText XM Fax and XM SendSecure Sign-on URL where you can initiate the login flow.
165171

166172
* Go to OpenText XM Fax and XM SendSecure Sign-on URL directly and initiate the login flow from there.
167173

168-
* You can use Microsoft My Apps. When you click the OpenText XM Fax and XM SendSecure tile in the My Apps, this will redirect to OpenText XM Fax and XM SendSecure Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
174+
* You can use Microsoft My Apps. When you click the OpenText XM Fax and XM SendSecure tile in the My Apps portal, this will redirect to OpenText XM Fax and XM SendSecure Sign-on URL. For more information about the My Apps portal, see [Introduction to the My Apps portal](../user-help/my-apps-portal-end-user-access.md).
169175

170176
## Next steps
171177

0 commit comments

Comments
 (0)