You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/troubleshoot-sspr-writeback.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: authentication
8
8
ms.topic: troubleshooting
9
-
ms.date: 02/22/2022
9
+
ms.date: 01/05/2023
10
10
11
11
ms.author: justinha
12
12
author: justinha
@@ -157,7 +157,7 @@ The following more specific issues may occur with password writeback. If you hav
157
157
| Federated, pass-through authentication, or password-hash-synchronized users who attempt to reset their passwords, see an error after they submit their password. The error indicates that there was a service problem. <br> <br> In addition to this problem, during password reset operations, you might see an error in your event logs from the Azure AD Connect service indicating an "Object could not be found" error. | This error usually indicates that the sync engine is unable to find either the user object in the Azure AD connector space or the linked metaverse (MV) or Azure AD connector space object. <br> <br> To troubleshoot this problem, make sure that the user is indeed synchronized from on-premises to Azure AD via the current instance of Azure AD Connect and inspect the state of the objects in the connector spaces and MV. Confirm that the Active Directory Certificate Services (AD CS) object is connected to the MV object via the "Microsoft.InfromADUserAccountEnabled.xxx" rule.|
158
158
| Federated, pass-through authentication, or password-hash-synchronized users who attempt to reset their passwords see an error after they submit their password. The error indicates that there was a service problem. <br> <br> In addition to this problem, during password reset operations, you might see an error in your event logs from the Azure AD Connect service that indicates that there's a "Multiple matches found" error. | This indicates that the sync engine detected that the MV object is connected to more than one AD CS object via "Microsoft.InfromADUserAccountEnabled.xxx". This means that the user has an enabled account in more than one forest. This scenario isn't supported for password writeback. |
159
159
| Password operations fail with a configuration error. The application event log contains Azure AD Connect error 6329 with the text "0x8023061f (The operation failed because password synchronization is not enabled on this Management Agent)". | This error occurs if the Azure AD Connect configuration is changed to add a new Active Directory forest (or to remove and readd an existing forest) after the password writeback feature has already been enabled. Password operations for users in these recently added forests fail. To fix the problem, disable and then re-enable the password writeback feature after the forest configuration changes have been completed.
160
-
| SSPR_0029: We are unable to reset your password due to an error in your on-premises configuration. Please contact your admin and ask them to investigate. | Problem: Password writeback has been enabled following all of the required steps, but when attempting to change a password you receive "SSPR_0029: Your organization hasn’t properly set up the on-premises configuration for password reset." Checking the event logs on the Azure AD Connect system shows that the management agent credential was denied access.Possible Solution: Use RSOP on the Azure AD Connect system and your domain controllers to see if the policy "Network access: Restrict clients allowed to make remote calls to SAM" found under Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options is enabled. Edit the policy to include the MSOL_XXXXXXX management account as an allowed user. |
160
+
| SSPR_0029: We are unable to reset your password due to an error in your on-premises configuration. Please contact your admin and ask them to investigate. | Problem: Password writeback has been enabled following all of the required steps, but when attempting to change a password you receive "SSPR_0029: Your organization hasn’t properly set up the on-premises configuration for password reset." Checking the event logs on the Azure AD Connect system shows that the management agent credential was denied access.Possible Solution: Use RSOP on the Azure AD Connect system and your domain controllers to see if the policy "Network access: Restrict clients allowed to make remote calls to SAM" found under Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options is enabled. Edit the policy to include the MSOL_XXXXXXX management account as an allowed user. For more information, see [Troubleshoot error SSPR_0029: Your organization hasn't properly set up the on-premises configuration for password reset](/troubleshoot/azure/active-directory/password-writeback-error-code-sspr-0029).|
Copy file name to clipboardExpand all lines: articles/active-directory/develop/howto-configure-publisher-domain.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,24 +2,26 @@
2
2
title: Configure an app's publisher domain
3
3
description: Learn how to configure an app's publisher domain to let users know where their information is being sent.
4
4
services: active-directory
5
-
author: rwike77
5
+
author: OwenRichards1
6
6
manager: CelesteDG
7
7
8
8
ms.service: active-directory
9
9
ms.subservice: develop
10
10
ms.topic: how-to
11
11
ms.workload: identity
12
-
ms.date: 11/11/2022
13
-
ms.author: ryanwi
12
+
ms.date: 01/05/2023
13
+
ms.author: owenrichards
14
14
ms.reviewer: xurobert, brianokoyo
15
15
ms.custom: contperf-fy21q4, aaddev
16
16
---
17
17
18
18
# Configure an app's publisher domain
19
19
20
-
An app’s publisher domain informs users where their information is being sent. The publisher domain also acts as an input or prerequisite for [publisher verification](publisher-verification-overview.md).
20
+
An app’s publisher domain informs users where their information is being sent. The publisher domain also acts as an input or prerequisite for [publisher verification](publisher-verification-overview.md). Depending on when the app was registered and the status of the Publisher Verification, it would be displayed directly to the user on the [application's consent prompt](application-consent-experience.md). An application’s publisher domain is displayed to users (depending on the state of Publisher Verification) on the consent UX to let users know where their information is being sent for trustworthiness.
21
21
22
-
In an app's [consent prompt](application-consent-experience.md), either the publisher domain or the publisher verification status appears. Which information is shown depends on whether the app is a [multitenant app](/azure/architecture/guide/multitenant/overview), when the app was registered, and the app's publisher verification status.
22
+
In an app's consent prompt, either the publisher domain or the publisher verification status appears. Which information is shown depends on whether the app is a [multitenant app](/azure/architecture/guide/multitenant/overview), when the app was registered, and the app's publisher verification status.
23
+
24
+
## Understand multitenant apps
23
25
24
26
A *multitenant app* is an app that supports user accounts that are outside a single organizational directory. For example, a multitenant app might support all Azure Active Directory (Azure AD) work or school accounts, or it might support both Azure AD work or school accounts and personal Microsoft accounts.
Copy file name to clipboardExpand all lines: articles/active-directory/reports-monitoring/concept-all-sign-ins.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: active-directory
8
8
ms.topic: conceptual
9
9
ms.workload: identity
10
10
ms.subservice: report-monitor
11
-
ms.date: 11/04/2022
11
+
ms.date: 01/05/2023
12
12
ms.author: sarahlipsey
13
13
ms.reviewer: besiler
14
14
ms.collection: M365-identity-device-management
@@ -41,6 +41,9 @@ To access the sign-ins log for a tenant, you must have one of the following role
41
41
- Global Reader
42
42
- Reports Reader
43
43
44
+
>[!NOTE]
45
+
>You might need conditional access administrator role to see applied conditional access policies in the sign-ins log.
46
+
44
47
The sign-in activity report is available in [all editions of Azure AD](reference-reports-data-retention.md#how-long-does-azure-ad-store-the-data). If you have an Azure Active Directory P1 or P2 license, you can access the sign-in activity report through the Microsoft Graph API. See [Getting started with Azure Active Directory Premium](../fundamentals/active-directory-get-started-premium.md) to upgrade your Azure Active Directory edition. It will take a couple of days for the data to show up in Graph after you upgrade to a premium license with no data activities before the upgrade.
* OpenText XM Fax and XM SendSecure supports **SP-initiated** SSO.
39
40
40
41
> [!NOTE]
41
42
> Identifier of this application is a fixed string value so only one instance can be configured in one tenant.
@@ -98,9 +99,9 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
98
99
99
100
|**Sign-on URL**|
100
101
|-------------|
101
-
|`https://login.xmedius.com/`|
102
-
|`https://login.xmedius.eu/`|
103
-
|`https://login.xmedius.ca/`|
102
+
|`https://login.xmedius.com/{account}`|
103
+
|`https://login.xmedius.eu/{account}`|
104
+
|`https://login.xmedius.ca/{account}`|
104
105
105
106
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Certificate (Base64)** and select **Download** to download the certificate and save it on your computer.
106
107
@@ -112,19 +113,19 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
112
113
113
114
### Create an Azure AD test user
114
115
115
-
In this section, you'll create a test user in the Azure portal called B.Simon.
116
+
In this section, you'll create a test user in the Azure portal called B.Simon:
116
117
117
118
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
118
119
1. Select **New user** at the top of the screen.
119
120
1. In the **User** properties, follow these steps:
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
123
124
1. Click **Create**.
124
125
125
126
### Assign the Azure AD test user
126
127
127
-
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to OpenText XM Fax and XM SendSecure.
128
+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to OpenText XM Fax and XM SendSecure:
128
129
129
130
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
130
131
1. In the applications list, select **OpenText XM Fax and XM SendSecure**.
@@ -144,28 +145,33 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
144
145
145
146
1. Provide the following required information:
146
147
147
-
a. In the **Sign In URL** textbox, paste the **Login URL** value which you have copied from the Azure portal.
148
+
a. In the **Issuer (Identity Provider)** textbox, paste the **Azure AD Identifier** value which you have copied from the Azure portal.
149
+
150
+
b. In the **Sign In URL** textbox, paste the **Login URL** value which you have copied from the Azure portal.
148
151
149
-
b. Open the downloaded **Certificate (Base64)** from the Azure portal into Notepad and paste the content into the **X.509 Signing Certificate** textbox.
152
+
c. Open the downloaded **Certificate (Base64)** from the Azure portal into Notepad and paste the content into the **X.509 Signing Certificate** textbox.
150
153
151
-
c. click **Save**.
154
+
d. click **Save**.
152
155
153
156
> [!NOTE]
154
157
> Keep the fail-safe URL (`https://login.[domain]/[account]/no-sso`) provided at the bottom of the SSO configuration section, it will allow you to log in using your XM Cloud account credentials if you lock yourself after SSO activation.
155
158
156
159
### Create OpenText XM Fax and XM SendSecure test user
157
160
158
-
In this section, you create a user called Britta Simon at OpenText XM Fax and XM SendSecure. Work with [OpenText XM Fax and XM SendSecure support team](mailto:[email protected]) to add the users in the OpenText XM Fax and XM SendSecure platform. Users must be created and activated before you use single sign-on.
161
+
Create a user called Britta Simon at OpenText XM Fax and XM SendSecure. Make sure the email is set to "[email protected]".
162
+
163
+
> [!NOTE]
164
+
> Users must be created and activated before you use single sign-on.
159
165
160
166
## Test SSO
161
167
162
-
In this section, you test your Azure AD single sign-on configuration with following options.
168
+
In this section, you test your Azure AD single sign-on configuration with the following options.
163
169
164
170
* Click on **Test this application** in Azure portal. This will redirect to OpenText XM Fax and XM SendSecure Sign-on URL where you can initiate the login flow.
165
171
166
172
* Go to OpenText XM Fax and XM SendSecure Sign-on URL directly and initiate the login flow from there.
167
173
168
-
* You can use Microsoft My Apps. When you click the OpenText XM Fax and XM SendSecure tile in the My Apps, this will redirect to OpenText XM Fax and XM SendSecure Sign-on URL. For more information about the My Apps, see [Introduction to the My Apps](../user-help/my-apps-portal-end-user-access.md).
174
+
* You can use Microsoft My Apps. When you click the OpenText XM Fax and XM SendSecure tile in the My Apps portal, this will redirect to OpenText XM Fax and XM SendSecure Sign-on URL. For more information about the My Apps portal, see [Introduction to the My Apps portal](../user-help/my-apps-portal-end-user-access.md).
0 commit comments