Skip to content

Commit 7e250a0

Browse files
authored
Merge pull request #198255 from MicrosoftDocs/main
5/13 PM Publish
2 parents 897d3cf + 284ce43 commit 7e250a0

File tree

112 files changed

+2751
-761
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

112 files changed

+2751
-761
lines changed

articles/active-directory/develop/TOC.yml

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -233,23 +233,7 @@
233233
- name: Remove an app registration
234234
href: ./howto-remove-app.md
235235
- name: Restore or remove a deleted app registration
236-
href: ./howto-restore-app.md
237-
- name: Multi-service tutorials
238-
items:
239-
- name: Secure web app accesses storage and Microsoft Graph
240-
items:
241-
- name: Overview
242-
href: multi-service-web-app-overview.md
243-
- name: Set up App Service authentication
244-
href: multi-service-web-app-authentication-app-service.md
245-
- name: Access storage as the app
246-
href: multi-service-web-app-access-storage.md
247-
- name: Access Microsoft Graph as the user
248-
href: multi-service-web-app-access-microsoft-graph-as-user.md
249-
- name: Access Microsoft Graph as the app
250-
href: multi-service-web-app-access-microsoft-graph-as-app.md
251-
- name: Clean up resources
252-
href: multi-service-web-app-clean-up-resources.md
236+
href: ./howto-restore-app.md
253237
- name: Single-page app (SPA)
254238
items:
255239
- name: SPA authentication documentation
@@ -340,6 +324,20 @@
340324
href: tutorial-blazor-server.md
341325
- name: Node.js
342326
href: tutorial-v2-nodejs-webapp-msal.md
327+
- name: Secure web app accesses storage and Microsoft Graph
328+
items:
329+
- name: Overview
330+
href: multi-service-web-app-overview.md
331+
- name: Set up App Service authentication
332+
href: multi-service-web-app-authentication-app-service.md
333+
- name: Access storage as the app
334+
href: multi-service-web-app-access-storage.md
335+
- name: Access Microsoft Graph as the user
336+
href: multi-service-web-app-access-microsoft-graph-as-user.md
337+
- name: Access Microsoft Graph as the app
338+
href: multi-service-web-app-access-microsoft-graph-as-app.md
339+
- name: Clean up resources
340+
href: multi-service-web-app-clean-up-resources.md
343341
- name: Samples
344342
displayName: code samples, example code, code snippets
345343
href: sample-v2-code.md#web-applications
@@ -372,7 +370,7 @@
372370
- name: Call a web API
373371
href: scenario-web-app-call-api-call-api.md
374372
- name: Move to production
375-
href: scenario-web-app-call-api-production.md
373+
href: scenario-web-app-call-api-production.md
376374
- name: Web API
377375
items:
378376
- name: Web API authentication documentation

articles/active-directory/develop/index-web-app.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,14 +42,20 @@ landingContent:
4242
url: tutorial-blazor-webassembly.md
4343
- text: Node.js with Express
4444
url: tutorial-v2-nodejs-webapp-msal.md
45-
- title: "Scenarios in depth"
45+
- title: "Web apps in depth"
4646
linkLists:
4747
- linkListType: how-to-guide
4848
links:
4949
- text: Web app that signs in users
5050
url: scenario-web-app-sign-user-overview.md
5151
- text: Web app that calls a web API
5252
url: scenario-web-app-call-api-overview.md
53+
- title: "Scenarios in depth"
54+
linkLists:
55+
- linkListType: tutorial
56+
links:
57+
- text: Secure web app accesses storage and Microsoft Graph
58+
url: multi-service-web-app-overview.md
5359
## ROW ################################################### ROW 2 ##
5460
# - title: $CARD_TITLE
5561
# linkLists:

articles/active-directory/fundamentals/whats-new.md

Lines changed: 13 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -31,25 +31,22 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
3131

3232
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [Archive for What's new in Azure Active Directory](whats-new-archive.md).
3333

34-
3534
## April 2022
3635

37-
### General Availability- Microsoft Defender for Cloud for Endpoint Signal in Identity Protection
38-
36+
### General Availability - Microsoft Defender for Endpoint Signal in Identity Protection
3937

4038
**Type:** New feature
4139
**Service category:** Identity Protection
4240
**Product capability:** Identity Security & Protection
4341

4442

45-
Identity Protection now integrates a signal from Microsoft Defender for Cloud for Endpoint (MDE) that will protect against PRT theft detection. To learn more, see: [What is risk? Azure AD Identity Protection | Microsoft Docs](../identity-protection/concept-identity-protection-risks.md).
43+
Identity Protection now integrates a signal from Microsoft Defender for Endpoint (MDE) that will protect against PRT theft detection. To learn more, see: [What is risk? Azure AD Identity Protection | Microsoft Docs](../identity-protection/concept-identity-protection-risks.md).
4644

4745

4846
---
4947

5048
### General availability - Entitlement management 3 stages of approval
5149

52-
5350
**Type:** Changed feature
5451
**Service category:** Other
5552
**Product capability:** Entitlement Management
@@ -63,7 +60,6 @@ This update extends the Azure AD entitlement management access package policy to
6360

6461
### General Availability - Improvements to Azure AD Smart Lockout
6562

66-
6763
**Type:** Changed feature
6864
**Service category:** Identity Protection
6965
**Product capability:** User Management
@@ -75,7 +71,6 @@ With a recent improvement, Smart Lockout now synchronizes the lockout state acro
7571

7672
---
7773

78-
7974
### Public Preview - Enabling customization capabilities for the Self-Service Password Reset (SSPR) hyperlinks, footer hyperlinks and browser icons in Company Branding.
8075

8176
**Type:** New feature
@@ -88,7 +83,6 @@ Updating the Company Branding functionality on the Azure AD/Microsoft 365 sign-i
8883

8984
### Public Preview - Integration of Microsoft 365 App Certification details into AAD UX and Consent Experiences
9085

91-
9286
**Type:** New feature
9387
**Service category:** User Access Management
9488
**Product capability:** AuthZ/Access Delegation
@@ -110,12 +104,10 @@ Updating the Company Branding functionality on the Azure AD/Microsoft 365 sign-i
110104

111105
### Public preview - Use Azure AD access reviews to review access of B2B direct connect users in Teams shared channels
112106

113-
114107
**Type:** New feature
115108
**Service category:** Access Reviews
116109
**Product capability:** Identity Governance
117110

118-
119111
Use Azure AD access reviews to review access of B2B direct connect users in Teams shared channels. For more information, see: [Include B2B direct connect users and teams accessing Teams Shared Channels in access reviews (preview)](../governance/create-access-review.md#include-b2b-direct-connect-users-and-teams-accessing-teams-shared-channels-in-access-reviews-preview).
120112

121113
---
@@ -127,24 +119,19 @@ Use Azure AD access reviews to review access of B2B direct connect users in Team
127119
**Product capability:** Identity Security & Protection
128120
**Clouds impacted:** Public (Microsoft 365, GCC)
129121

130-
131122
We're announcing the public preview of following MS Graph APIs and PowerShell cmdlets for configuring federated settings when federated with Azure AD:
132123

133-
134124
|Action |MS Graph API |PowerShell cmdlet |
135125
|---------|---------|---------|
136-
|Get federation settings for a federated domain | [Get internalDomainFederation](https://docs.microsoft.com/graph/api/internaldomainfederation-get?view=graph-rest-beta) | [Get-MgDomainFederationConfiguration](https://docs.microsoft.com/powershell/module/microsoft.graph.identity.directorymanagement/get-mgdomainfederationconfiguration?view=graph-powershell-beta) |
137-
|Create federation settings for a federated domain | [Create internalDomainFederation](https://docs.microsoft.com/graph/api/domain-post-federationconfiguration?view=graph-rest-beta) | [New-MgDomainFederationConfiguration](https://docs.microsoft.com/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdomainfederationconfiguration?view=graph-powershell-beta) |
138-
|Remove federation settings for a federated domain | [Delete internalDomainFederation](https://docs.microsoft.com/graph/api/internaldomainfederation-delete?view=graph-rest-beta) | [Remove-MgDomainFederationConfiguration](https://docs.microsoft.com/powershell/module/microsoft.graph.identity.directorymanagement/remove-mgdomainfederationconfiguration?view=graph-powershell-beta) |
139-
|Update federation settings for a federated domain | [Update internalDomainFederation](https://docs.microsoft.com/graph/api/internaldomainfederation-update?view=graph-rest-beta) | [Update-MgDomainFederationConfiguration](https://docs.microsoft.com/powershell/module/microsoft.graph.identity.directorymanagement/update-mgdomainfederationconfiguration?view=graph-powershell-beta) |
140-
141-
126+
|Get federation settings for a federated domain | [Get internalDomainFederation](/graph/api/internaldomainfederation-get?view=graph-rest-beta&preserve-view=true) | [Get-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/get-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true) |
127+
|Create federation settings for a federated domain | [Create internalDomainFederation](/graph/api/domain-post-federationconfiguration?view=graph-rest-beta&preserve-view=true) | [New-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/new-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true) |
128+
|Remove federation settings for a federated domain | [Delete internalDomainFederation](/graph/api/internaldomainfederation-delete?view=graph-rest-beta&preserve-view=true) | [Remove-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/remove-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true) |
129+
|Update federation settings for a federated domain | [Update internalDomainFederation](/graph/api/internaldomainfederation-update?view=graph-rest-beta&preserve-view=true) | [Update-MgDomainFederationConfiguration](/powershell/module/microsoft.graph.identity.directorymanagement/update-mgdomainfederationconfiguration?view=graph-powershell-beta&preserve-view=true) |
142130

143-
If using older MSOnline cmdlets ([Get-MsolDomainFederationSettings](https://docs.microsoft.com/powershell/module/msonline/get-msoldomainfederationsettings?view=azureadps-1.0) and [Set-MsolDomainFederationSettings](https://docs.microsoft.com/powershell/module/msonline/set-msoldomainfederationsettings?view=azureadps-1.0)), we highly recommend transitioning to the latest MS Graph APIs and PowerShell cmdlets.
144131

132+
If using older MSOnline cmdlets ([Get-MsolDomainFederationSettings](/powershell/module/msonline/get-msoldomainfederationsettings?view=azureadps-1.0&preserve-view=true) and [Set-MsolDomainFederationSettings](/powershell/module/msonline/set-msoldomainfederationsettings?view=azureadps-1.0&preserve-view=true)), we highly recommend transitioning to the latest MS Graph APIs and PowerShell cmdlets.
145133

146-
For more information, see [internalDomainFederation resource type - Microsoft Graph beta | Microsoft Docs](https://docs.microsoft.com/graph/api/resources/internaldomainfederation?view=graph-rest-beta).
147-
134+
For more information, see [internalDomainFederation resource type - Microsoft Graph beta | Microsoft Docs](/graph/api/resources/internaldomainfederation?view=graph-rest-beta&preserve-view=true).
148135

149136
---
150137

@@ -166,9 +153,9 @@ Added functionality to session controls allowing admins to reauthenticate a user
166153
**Product capability:** Identity Security & Protection
167154
**Clouds impacted:** Public (Microsoft 365, GCC)
168155

169-
We're delighted to announce a new security protection that prevents bypassing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD. When enabled for a federated domain in your Azure AD tenant, it ensures that a compromised federated account can't bypass Azure AD Multi-Factor Authentication by imitating that a multi factor authentication has already been performed by the identity provider. The protection can be enabled via new security setting, [federatedIdpMfaBehavior](https://docs.microsoft.com/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values).
156+
We're delighted to announce a new security protection that prevents bypassing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD. When enabled for a federated domain in your Azure AD tenant, it ensures that a compromised federated account can't bypass Azure AD Multi-Factor Authentication by imitating that a multi factor authentication has already been performed by the identity provider. The protection can be enabled via new security setting, [federatedIdpMfaBehavior](/graph/api/resources/internaldomainfederation?view=graph-rest-beta#federatedidpmfabehavior-values&preserve-view=true).
170157

171-
We highly recommend enabling this new protection when using Azure AD Multi-Factor Authentication as your multi factor authentication for your federated users. To learn more about the protection and how to enable it, visit [Enable protection to prevent by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD](https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#enable-protection-to-prevent-by-passing-of-cloud-azure-ad-multi-factor-authentication-when-federated-with-azure-ad).
158+
We highly recommend enabling this new protection when using Azure AD Multi-Factor Authentication as your multi factor authentication for your federated users. To learn more about the protection and how to enable it, visit [Enable protection to prevent by-passing of cloud Azure AD Multi-Factor Authentication when federated with Azure AD](/windows-server/identity/ad-fs/deployment/best-practices-securing-ad-fs#enable-protection-to-prevent-by-passing-of-cloud-azure-ad-multi-factor-authentication-when-federated-with-azure-ad).
172159

173160
---
174161

@@ -183,7 +170,6 @@ In April 2022 we added the following 24 new applications in our App gallery with
183170

184171
You can also find the documentation of all the applications from here https://aka.ms/AppsTutorial.
185172

186-
187173
For listing your application in the Azure AD app gallery, please read the details here https://aka.ms/AzureADAppRequest
188174

189175
---
@@ -197,11 +183,9 @@ For listing your application in the Azure AD app gallery, please read the detail
197183

198184
From April 15, 2022, Microsoft began storing Azure AD’s Customer Data for new tenants with a Japan billing address within the Japanese data centers. For more information, see: [Customer data storage for Japan customers in Azure Active Directory](active-directory-data-storage-japan.md).
199185

200-
201186
---
202187

203188

204-
205189
### Public Preview - New provisioning connectors in the Azure AD Application Gallery - April 2022
206190

207191
**Type:** New feature
@@ -217,7 +201,6 @@ You can now automate creating, updating, and deleting user accounts for these ne
217201

218202
For more information about how to better secure your organization by using automated user account provisioning, see: [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md)
219203

220-
221204
---
222205

223206
## March 2022
@@ -262,7 +245,6 @@ For more information about how to better secure your organization by using autom
262245
---
263246

264247

265-
266248
### Public preview - Azure AD Recommendations
267249

268250
**Type:** New feature
@@ -320,7 +302,6 @@ You can also find the documentation of all the applications from here https://ak
320302

321303
For listing your application in the Azure AD app gallery, please read the details here https://aka.ms/AzureADAppRequest
322304

323-
324305
---
325306

326307

@@ -342,14 +323,12 @@ For listing your application in the Azure AD app gallery, please read the detail
342323
---
343324

344325

345-
346326
## February 2022
347327

348328

349329
---
350330

351331

352-
353332
### General Availability - France digital accessibility requirement
354333

355334
**Type:** Plan for change
@@ -363,7 +342,6 @@ This change provides users who are signing into Azure Active Directory on iOS, A
363342
---
364343

365344

366-
367345
### General Availability - Downloadable access review history report
368346

369347
**Type:** New feature
@@ -376,11 +354,9 @@ With Azure Active Directory (Azure AD) Access Reviews, you can create a download
376354

377355
---
378356

379-
380357
---
381358

382359

383-
384360
### Public Preview of Identity Protection for Workload Identities
385361

386362
**Type:** New feature
@@ -394,7 +370,6 @@ Azure AD Identity Protection is extending its core capabilities of detecting, in
394370
---
395371

396372

397-
398373
### Public Preview - Cross-tenant access settings for B2B collaboration
399374

400375
**Type:** New feature
@@ -409,7 +384,6 @@ Cross-tenant access settings enable you to control how users in your organizatio
409384
---
410385

411386

412-
413387
### Public preview - Create Azure AD access reviews with multiple stages of reviewers
414388

415389
**Type:** New feature
@@ -438,7 +412,6 @@ You can also find the documentation of all the applications from here: [https://
438412

439413
For listing your application in the Azure AD app gallery, please read the details here: [https://aka.ms/AzureADAppRequest](../manage-apps/v2-howto-app-gallery-listing.md)
440414

441-
442415

443416

444417
---
@@ -493,7 +466,6 @@ We have improved the Privileged Identity management (PIM) time to role activatio
493466

494467

495468

496-
497469
## January 2022
498470

499471
### Public preview - Custom security attributes
@@ -662,7 +634,7 @@ We’re no longer publishing sign-in logs with the following error codes because
662634

663635
|Error code | Failure reason|
664636
| --- | --- |
665-
|50058| Session information isn’t sufficient for single-sign-on.|
637+
|50058| Session information isn’t sufficient for single-sign-on.|
666638
|16000| Either multiple user identities are available for the current request or selected account isn’t supported for the scenario.|
667639
|500581| Rendering JavaScript. Fetching sessions for single-sign-on on V2 with prompt=none requires JavaScript to verify if any MSA accounts are signed in.|
668640
|81012| The user trying to sign in to Azure AD is different from the user signed into the device.|
@@ -865,3 +837,5 @@ Updated "switch organizations" user interface in My Account. This visually impro
865837

866838
---
867839

840+
841+

articles/active-directory/manage-apps/migrate-okta-sync-provisioning-to-azure-active-directory.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -79,11 +79,11 @@ The example will grab *all* on-premises Azure AD users and export a list of thei
7979
1. Run these commands in PowerShell on a domain controller on-premises:
8080

8181
```PowerShell
82-
Get-ADUser -Filter * -Properties objectGUID | Select-Object
82+
Get-ADUser -Filter * -Properties objectGUID | Select -Object
8383
UserPrincipalName, Name, objectGUID, @{Name = 'ImmutableID';
8484
Expression = {
85-
[system.convert\]::ToBase64String(([GUID\]\$_.objectGUID).ToByteArray())
86-
} } | export-csv C:\\Temp\\OnPremIDs.csv
85+
[system.convert]::ToBase64String((GUID).tobytearray())
86+
} } | export-csv C:\Temp\OnPremIDs.csv
8787
```
8888

8989
![Screenshot that shows domain controller on-premises commands.](./media/migrate-okta-sync-provisioning-to-azure-active-directory-connect-based-synchronization/domain-controller.png)

0 commit comments

Comments
 (0)