You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/cloud-infrastructure-entitlement-management/cloudknox-onboard-enable-tenant.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ To view a video on how to enable CloudKnox in your Azure AD tenant, select
66
66
67
67
1. Copy the script on the **Welcome** screen:
68
68
69
-
`az ad ap create --id b46c3ac5-9da6-418f-a849-0a7a10b3c6c`
69
+
`az ad sp create --id b46c3ac5-9da6-418f-a849-0a07a10b3c6c`
70
70
71
71
1. If you have an Azure subscription, return to the Azure AD portal and select **Cloud Shell** on the navigation bar.
72
72
If you don't have an Azure subscription, open a command prompt on a Windows Server.
@@ -106,4 +106,4 @@ Use the **Data Collectors** dashboard in CloudKnox to configure data collection
106
106
107
107
- For an overview of CloudKnox, see [What's CloudKnox Permissions Management?](cloudknox-overview.md)
108
108
- For a list of frequently asked questions (FAQs) about CloudKnox, see [FAQs](cloudknox-faqs.md).
109
-
- For information on how to start viewing information about your authorization system in CloudKnox, see [View key statistics and data about your authorization system](cloudknox-ui-dashboard.md).
109
+
- For information on how to start viewing information about your authorization system in CloudKnox, see [View key statistics and data about your authorization system](cloudknox-ui-dashboard.md).
Copy file name to clipboardExpand all lines: articles/active-directory/develop/scenario-web-api-call-api-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ This scenario, in which a protected web API calls other web APIs, builds on [Sce
32
32
33
33
## Specifics
34
34
35
-
The app registration part that's related to API permissions is classical. The app configuration involves using the OAuth 2.0 On-Behalf-Of flow to exchange the JWT bearer token against a token for a downstream API. This token is added to the token cache, where it's available in the web API's controllers, and it can then acquire a token silently to call downstream APIs.
35
+
The app registration part that's related to API permissions is classical. The app configuration involves using the OAuth 2.0 On-Behalf-Of flow to use the JWT bearer token for obtaining a second token for a downstream API. The second token in this case is added to the token cache, where it's available in the web API's controllers. This second token can be used to acquire an access token silently to call downstream APIs whenever required.
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new.md
+161Lines changed: 161 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,168 @@ Azure AD receives improvements on an ongoing basis. To stay up to date with the
31
31
32
32
This page is updated monthly, so revisit it regularly. If you're looking for items older than six months, you can find them in [Archive for What's new in Azure Active Directory](whats-new-archive.md).
### General Availability - France digital accessibility requirement
43
+
44
+
**Type:** Plan for change
45
+
**Service category:** Other
46
+
**Product capability:** End User Experiences
47
+
48
+
49
+
This change provides users who are signing into Azure Active Directory on iOS, Android, and Web UI flavors information about the accessibility of Microsoft's online services via a link on the sign-in page. This ensures that the France digital accessibility compliance requirements are met. The change will only be available for French language experiences.[Learn more](https://www.microsoft.com/fr-fr/accessibility/accessibilite/accessibility-statement)
### General Availability - Downloadable access review history report
58
+
59
+
**Type:** New feature
60
+
**Service category:** Access Reviews
61
+
**Product capability:** Identity Governance
62
+
63
+
64
+
With Azure Active Directory (Azure AD) Access Reviews, you can create a downloadable review history to help your organization gain more insight. The report pulls the decisions that were taken by reviewers when a report is created. These reports can be constructed to include specific access reviews, for a specific time frame, and can be filtered to include different review types and review results.[Learn more](../governance/access-reviews-downloadable-review-history.md)
Azure AD Identity Protection is extending its core capabilities of detecting, investigating, and remediating identity-based risk to workload identities. This allows organizations to better protect their applications, service principals, and managed identities. We are also extending Conditional Access so you can block at-risk workload identities. [Learn more](../identity-protection/concept-workload-identity-risk.md)
Cross-tenant access settings enable you to control how users in your organization collaborate with members of external Azure AD organizations. Now you’ll have granular inbound and outbound access control settings that work on a per org, user, group, and application basis. These settings also make it possible for you to trust security claims from external Azure AD organizations like multifactor authentication (MFA), device compliance, and hybrid Azure AD joined devices. [Learn more](../external-identities/cross-tenant-access-overview.md)
### Public preview - Create Azure AD access reviews with multiple stages of reviewers
107
+
108
+
**Type:** New feature
109
+
**Service category:** Access Reviews
110
+
**Product capability:** Identity Governance
111
+
112
+
113
+
Use multi-stage reviews to create Azure AD access reviews in sequential stages, each with its own set of reviewers and configurations. Supports multiple stages of reviewers to satisfy scenarios such as: independent groups of reviewers reaching quorum, escalations to other reviewers, and reducing burden by allowing for later stage reviewers to see a filtered-down list. For public preview, multi-stage reviews are only supported on reviews of groups and applications. [Learn more](../governance/create-access-review.md)
You can also find the documentation of all the applications from here: [https://aka.ms/AppsTutorial](https://aka.ms/AppsTutorial),
133
+
134
+
For listing your application in the Azure AD app gallery, please read the details here: [https://aka.ms/AzureADAppRequest](https://aka.ms/AzureADAppRequest)
Identity Protection has added two new detections from Microsoft Defender for Cloud Apps, (formerly MCAS). The Mass Access to Sensitive Files detection detects anomalous user activity, and the Unusual Addition of Credentials to an OAuth app detects suspicious service principal activity.[Learn more](../identity-protection/concept-identity-protection-risks.md)
For more information about how to better secure your organization by using automated user account provisioning, see [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
We have improved the Privileged Identity management (PIM) time to role activation for SharePoint Online. Now, when activating a role in PIM for SharePoint Online, you should be able to use your permissions right away in SharePoint Online. This change will roll out in stages, so you might not yet see these improvements in your organization. [Learn more](../privileged-identity-management/pim-how-to-activate-role.md)
Copy file name to clipboardExpand all lines: articles/active-directory/manage-apps/tutorial-manage-access-security.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,20 +129,20 @@ The My Apps portal enables administrators and users to manage the applications u
129
129
130
130
You can keep the resources for future use, or if you're not going to continue to use the resources created in this tutorial, delete them with the following steps.
131
131
132
-
## Delete the application
132
+
###Delete the application
133
133
134
134
1. In the left menu, select **Enterprise applications**. The **All applications** pane opens and displays a list of the applications in your Azure AD tenant. Search for and select the application that you want to delete.
135
135
1. In the **Manage** section of the left menu, select **Properties**.
136
136
1. At the top of the **Properties** pane, select **Delete**, and then select **Yes** to confirm you want to delete the application from your Azure AD tenant.
137
137
138
-
## Delete the conditional access policy
138
+
###Delete the conditional access policy
139
139
140
140
1. Select **Enterprise applications**.
141
141
1. Under **Security**, select **Conditional Access**.
142
142
1. Search for and select **MFA Pilot**.
143
143
1. Select **Delete** at the top of the pane.
144
144
145
-
## Delete the group
145
+
###Delete the group
146
146
147
147
1. Select **Azure Active Directory**, and then select **Groups**.
148
148
1. From the **Groups - All groups** page, search for and select the **MFA-Test-Group** group.
0 commit comments