Skip to content

Commit 7e8a34d

Browse files
authored
Merge pull request #224713 from MicrosoftDocs/main
1/23 AM Publish
2 parents e6349b9 + 081cb9c commit 7e8a34d

File tree

159 files changed

+1822
-1781
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

159 files changed

+1822
-1781
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11055,6 +11055,16 @@
1105511055
"source_path_from_root": "/articles/active-directory/develop/microsoft-graph-intro.md",
1105611056
"redirect_url": "/graph/overview?toc=/azure/active-directory/develop/toc.json&bc=/azure/active-directory/develop/breadcrumb/toc.json",
1105711057
"redirect_document_id": false
11058+
},
11059+
{
11060+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/concept-privileged-access-versus-role-assignable.md",
11061+
"redirect_url": "azure/active-directory/privileged-identity-management/concept-pim-for-groups",
11062+
"redirect_document_id": false
11063+
},
11064+
{
11065+
"source_path_from_root": "/articles/active-directory/privileged-identity-management/groups-features.md",
11066+
"redirect_url": "azure/active-directory/privileged-identity-management/concept-pim-for-groups",
11067+
"redirect_document_id": false
1105811068
}
1105911069
]
1106011070
}

.openpublishing.redirection.azure-monitor.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3787,14 +3787,19 @@
37873787
"redirect_url": "/azure/azure-monitor/alerts/alerts-classic-portal",
37883788
"redirect_document_id": false
37893789
},
3790+
{
3791+
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema-definitions.md",
3792+
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema",
3793+
"redirect_document_id": false
3794+
},
37903795
{
37913796
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema.md",
37923797
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema",
37933798
"redirect_document_id": false
37943799
},
37953800
{
3796-
"source_path_from_root": "/articles/azure-monitor/platform/alerts-common-schema-definitions.md",
3797-
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema-definitions",
3801+
"source_path_from_root": "/articles/azure-monitor/alerts/alerts-common-schema-definitions.md",
3802+
"redirect_url": "/azure/azure-monitor/alerts/alerts-common-schema",
37983803
"redirect_document_id": false
37993804
},
38003805
{
@@ -5661,6 +5666,11 @@
56615666
"source_path_from_root": "/articles/azure-monitor/vm/monitor-virtual-machine-workloads.md",
56625667
"redirect_url": "/azure/azure-monitor/vm/monitor-virtual-machine-data-collection",
56635668
"redirect_document_id": false
5669+
},
5670+
{
5671+
"source_path_from_root": "/articles/azure-monitor/logs/azure-data-explorer-monitor-cross-service-query.md",
5672+
"redirect_url": "/azure/azure-monitor/logs/azure-monitor-data-explorer-proxy",
5673+
"redirect_document_id": false
56645674
}
56655675
]
56665676
}
68.3 KB
Loading

articles/active-directory-b2c/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.workload: identity
1010
ms.topic: overview
1111
ms.date: 10/26/2022
1212
ms.custom: engagement-fy23
13-
ms.author: kengaderdus
13+
ms.author: godonnell
1414
ms.subservice: B2C
1515
---
1616

articles/active-directory-b2c/partner-datawiza.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.subservice: B2C
1616

1717
# Tutorial: Configure Azure Active Directory B2C with Datawiza to provide secure hybrid access
1818

19-
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with [Datawiza Access Broker (DAB)](https://www.datawiza.com/access-broker). DAB enables single sign-on (SSO) and granular access control, helping Azure AD B2C protect on-premises legacy applications. With this solution, enterprises can transition from legacy to Azure AD B2C without rewriting applications.
19+
In this tutorial, learn how to integrate Azure Active Directory B2C (Azure AD B2C) with [Datawiza Access Proxy (DAP)](https://www.datawiza.com/), which enables single sign-on (SSO) and granular access control, helping Azure AD B2C protect on-premises legacy applications. With this solution, enterprises can transition from legacy to Azure AD B2C without rewriting applications.
2020

2121
## Prerequisites
2222

@@ -29,7 +29,7 @@ To get started, you'll need:
2929
- Your applications can run on platforms such as virtual machine and bare metal
3030
- An on-premises application to transition from a legacy identity system, to Azure AD B2C
3131
- In this tutorial, DAB is deployed on the same server as the application
32-
- The application runs on localhost: 3001 and DAB proxies traffic to applications via localhost: 9772
32+
- The application runs on localhost: 3001 and DAP proxies traffic to applications via localhost: 9772
3333
- The application traffic reaches DAB first and then is proxied to the application
3434

3535
## Scenario description
@@ -38,17 +38,17 @@ Datawiza integration includes the following components:
3838

3939
- **Azure AD B2C**: The authorization server to verify user credentials
4040
- Authenticated users access on-premises applications using a local account stored in the Azure AD B2C directory
41-
- **Datawiza Access Broker (DAB)**: The service that passes identity to applications through HTTP headers
41+
- **Datawiza Access Proxy (DAP)**: The service that passes identity to applications through HTTP headers
4242
- **Datawiza Cloud Management Console (DCMC)**: A management console for DAB. DCMC UI and RESTful APIs help manage DAB configurations and access control policies
4343

4444
The following architecture diagram shows the implementation.
4545

4646
![Diagram of the architecture of an Azure AD B2C integration with Datawiza for secure access to hybrid applications.](./media/partner-datawiza/datawiza-architecture-diagram.png)
4747

4848
1. The user requests access to an on-premises application. DAB proxies the request to the application.
49-
2. DAB checks user authentication state. With no session token, or an invalid token, the user goes to Azure AD B2C for authentication.
50-
3. Azure AD B2C sends the user request to the endpoint specified during DAB registration in the Azure AD B2C tenant.
51-
4. The DAB evaluates access policies and calculates attribute values in HTTP headers forwarded to the application. The DAB might call to the identity provider (IdP) to retrieve information to set the header values. The DAB sets the header values and sends the request to the application.
49+
2. DAP checks user authentication state. With no session token, or an invalid token, the user goes to Azure AD B2C for authentication.
50+
3. Azure AD B2C sends the user request to the endpoint specified during DAP registration in the Azure AD B2C tenant.
51+
4. The DAP evaluates access policies and calculates attribute values in HTTP headers forwarded to the application. The DAP might call to the identity provider (IdP) to retrieve information to set the header values. The DAP sets the header values and sends the request to the application.
5252
5. The user is authenticated with access to the application.
5353

5454
## Onboard with Datawiza
@@ -74,11 +74,11 @@ Go to docs.datawiza.com to:
7474

7575
## Run DAB with a header-based application
7676

77-
You can use Docker or Kubernetes to run DAB. Use the Docker image for users to create a sample header-based application.
77+
You can use Docker or Kubernetes to run DAP. Use the Docker image for users to create a sample header-based application.
7878

79-
Learn more: To configure DAB and SSO integration, see [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html)
79+
Learn more: To configure DAP and SSO integration, see [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html)
8080

81-
A sample docker image `docker-compose.yml file` is provided. Sign in to the container registry to download DAB images and the header-based application.
81+
A sample docker image `docker-compose.yml file` is provided. Sign in to the container registry to download DAP images and the header-based application.
8282

8383
1. [Deploy Datawiza Access Proxy With Your App](https://docs.datawiza.com/step-by-step/step3.html#important-step).
8484

@@ -114,17 +114,17 @@ A sample docker image `docker-compose.yml file` is provided. Sign in to the cont
114114

115115
DAB gets user attributes from IdP and passes them to the application with header or cookie. After you configure user attributes, the green check sign appears for user attributes.
116116

117-
![Screenshot of passed user attributes.](./media/partner-datawiza/pass-user-attributes.png)
117+
![Screenshot of passed user attributes.](./media/partner-datawiza/pass-user-attributes-new.png)
118118

119119
Learn more: [Pass User Attributes](https://docs.datawiza.com/step-by-step/step4.html) such as email address, firstname, and lastname to the header-based application.
120120

121121
## Test the flow
122122

123123
1. Navigate to the on-premises application URL.
124-
2. The DAB redirects to the page you configured in your user flow.
124+
2. The DAP redirects to the page you configured in your user flow.
125125
3. From the list, select the IdP.
126126
4. At the prompt, enter your credentials. If necessary, include an Azure AD Multi-Factor Authentication (MFA) token.
127-
5. You're redirected to Azure AD B2C, which forwards the application request to the DAB redirect URI.
127+
5. You're redirected to Azure AD B2C, which forwards the application request to the DAP redirect URI.
128128
6. The DAB evaluates policies, calculates headers, and sends the user to the upstream application.
129129
7. The requested application appears.
130130

articles/active-directory-b2c/partner-ping-identity.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.reviewer: kengaderdus
99
ms.service: active-directory
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 12/9/2022
12+
ms.date: 01/20/2023
1313
ms.author: gasinh
1414
ms.subservice: B2C
1515
---
@@ -22,7 +22,7 @@ Many e-commerce sites and web applications exposed to the internet are deployed
2222

2323
Generally, configurations include an authentication translation layer that externalizes the authentication from the web application. Reverse proxies provide the authenticated user context to the web applications, such as a header value in clear or digest form. The applications aren't using industry standard tokens such as Security Assertion Markup Language (SAML), OAuth, or Open ID Connect (OIDC). Instead, the proxy provides authentication context and maintains the session with the end-user agent such as browser or native application. As a service running as a man-in-the-middle, proxies provide significant session control. The proxy service is efficient and scalable, not a bottleneck for applications behind the proxy service. The diagram is a reverse-proxy implementation and communications flow.
2424

25-
![Reverse proxy implementation](./media/partner-ping/reverse-proxy.png)
25+
![Diagram of the reverse proxy implementation.](./media/partner-ping/reverse-proxy.png)
2626

2727
## Modernization
2828

@@ -45,7 +45,7 @@ Proxies support the modern authentication protocols and use the redirect-based (
4545
In Azure AD B2C, you define policies that drive user experiences and behaviors, also called user journeys. Each such policy exposes a protocol endpoint that can perform the authentication as an IdP. On the application side, there's no special handling required for certain policies. An application makes a standard authentication request to the protocol-specific authentication endpoint exposed by a policy.
4646
You can configure Azure AD B2C to share the same issuer across policies or unique issuer for each policy. Each application can point to policies by making a protocol-native authentication request, which drives user behaviors such as sign-in, sign-up, and profile edits. The diagram shows OIDC and SAML application workflows.
4747

48-
![O I D C and S A M L implementation](./media/partner-ping/azure-ad-identity-provider.png)
48+
![Diagram of the OIDC and SAML application workflows.](./media/partner-ping/azure-ad-identity-provider.png)
4949

5050
The scenario can be challenging for the legacy applications to redirect the user accurately. The access request to the applications might not include the user experience context. In most cases, the proxy layer, or an integrated agent on the web application, intercepts the access request.
5151

@@ -55,27 +55,27 @@ You can deploy PingAccess as the reverse proxy. PingAccess intercepts a direct r
5555

5656
Configure PingAccess with OIDC, OAuth2, or SAML for authentication with an upstream authentication provider. You can configure an upstream IdP for this purpose on the PingAccess server. See the following diagram.
5757

58-
![PingAccess with O I D C implementation](./media/partner-ping/authorization-flow.png)
58+
![Diagram of an upstream IDP on a PingAccess server.](./media/partner-ping/authorization-flow.png)
5959

6060
In a typical Azure AD B2C deployment with policies exposing IdPs, there's a challenge. PingAccess is configured with one, upstream IdP.
6161

6262
### PingFederate federation proxy
6363

64-
You can configure PingFederate as an authentication provider, or a proxy. for upstream IdPs. See the following diagram.
64+
You can configure PingFederate as an authentication provider, or a proxy, for upstream IdPs. See the following diagram.
6565

66-
![PingFederate implementation](./media/partner-ping/pingfederate.png)
66+
![Diagram of PingFederate configured an authentication provider, or a proxy, for upstream IDPs.](./media/partner-ping/pingfederate.png)
6767

6868
Use this function to contextually, dynamically, or declaratively switch an inbound request to an Azure AD B2C policy. See the following diagram of protocol sequence flow.
6969

70-
![image shows the PingAccess and PingFederate workflow](./media/partner-ping/pingaccess-pingfederate-workflow.png)
70+
![Diagram of the protocol sequence flow for PingAccess, PingFederate, Azure AD B2C, and the applicaiton.](./media/partner-ping/pingaccess-pingfederate-workflow.png)
7171

7272
## Prerequisites
7373

7474
To get started, you'll need:
7575

7676
- An Azure subscription
7777
- If you don't have one, get an [Azure free account](https://azure.microsoft.com/free/)
78-
- An [Azure AD B2C tenant](/tutorial-create-tenant.md) linked to your Azure subscription
78+
- An [Azure AD B2C tenant](tutorial-create-tenant.md) linked to your Azure subscription
7979
- PingAccess and PingFederate deployed in Docker containers or on Azure virtual machines (VMs)
8080

8181
## Connectivity and communication
@@ -93,15 +93,15 @@ Confirm the following connectivity and communication.
9393

9494
You can use basic user flows or advanced Identity Enterprise Framework (IEF) policies. PingAccess generates the metadata endpoint, based on the issuer value, by using the [WebFinger](https://tools.ietf.org/html/rfc7033) protocol for discovery convention. To follow this convention, update the Azure AD B2C issuer using user-flow policy properties.
9595

96-
![image shows the token settings](./media/partner-ping/token-setting.png)
96+
![Screenshot of the subject sub claim URL on the Token compatibility dialog.](./media/partner-ping/token-setting.png)
9797

9898
In the advanced policies, configuration includes the IssuanceClaimPattern metadata element to AuthorityWithTfp value in the [JWT token issuer technical profile](./jwt-issuer-technical-profile.md).
9999

100100
## Configure PingAccess and PingFederate
101101

102102
Use the instructions in the following sections to configure PingAccess and PingFederate. See the following diagram of the overall integration user flow.
103103

104-
![PingAccess and PingFederate integration](./media/partner-ping/pingaccess.png)
104+
![Diagram of the PingAccess and PingFederate integration user flow](./media/partner-ping/pingaccess.png)
105105

106106
### Configure PingFederate as the token provider
107107

@@ -116,7 +116,7 @@ Use the following instructions to create a PingAccess application for the target
116116
#### Create a virtual host
117117

118118
>[!IMPORTANT]
119-
>Create a virtual host for every application. For more information, see [What can I configure with PingAccess?]([https://docs.pingidentity.com/bundle/pingaccess-43/page/reference/pa_c_KeyConsiderations.html](https://docs.pingidentity.com/bundle/pingaccess-71/page/kkj1564006722708.html).
119+
>Create a virtual host for every application. For more information, see [What can I configure with PingAccess?]([https://docs.pingidentity.com/bundle/pingaccess-43/page/reference/pa_c_KeyConsiderations.html].
120120
121121
To create a virtual host:
122122

articles/active-directory-b2c/quickstart-native-app-desktop.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: "Quickstart: Set up sign in for a desktop app using Azure Active Director
33
titleSuffix: Azure AD B2C
44
description: In this Quickstart, run a sample WPF desktop application that uses Azure Active Directory B2C to provide account sign in.
55
services: active-directory-b2c
6-
author: kengaderdus
6+
author: garrodonnell
77
manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: quickstart
1111
ms.custom: mvc, mode-other
1212
ms.date: 01/13/2022
13-
ms.author: kengaderdus
13+
ms.author: godonnell
1414
ms.subservice: B2C
1515
---
1616

articles/active-directory-b2c/quickstart-single-page-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@ title: "Quickstart: Set up sign in for a single-page app (SPA)"
33
titleSuffix: Azure AD B2C
44
description: In this Quickstart, run a sample single-page application that uses Azure Active Directory B2C to provide account sign-in.
55
services: active-directory-b2c
6-
author: kengaderdus
6+
author: garrodonnell
77
manager: CelesteDG
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: quickstart
1111
ms.date: 01/13/2022
12-
ms.author: kengaderdus
12+
ms.author: godonnell
1313
ms.subservice: B2C
1414
ms.custom: mode-other
1515
---

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -148,6 +148,7 @@ The following client apps are confirmed to support this setting, this list isn't
148148
- Microsoft Cortana
149149
- Microsoft Edge
150150
- Microsoft Excel
151+
- Microsoft Flow Mobile
151152
- Microsoft Launcher
152153
- Microsoft Lists
153154
- Microsoft Office

articles/active-directory/privileged-identity-management/TOC.yml

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,8 @@
88
items:
99
- name: License requirements
1010
href: subscription-requirements.md
11-
- name: Privileged Access groups
12-
href: groups-features.md
13-
- name: Role-assignable vs Privileged Access groups
14-
href: concept-privileged-access-versus-role-assignable.md
11+
- name: PIM for Groups
12+
href: concept-pim-for-groups.md
1513
- name: Roles you can't manage with PIM
1614
href: pim-roles.md
1715
- name: Secure privileged access in Azure AD
@@ -32,51 +30,51 @@
3230
href: pim-deployment-plan.md
3331
- name: Start using PIM
3432
href: pim-getting-started.md
33+
- name: Bring under management
34+
items:
35+
- name: Azure resources
36+
href: pim-resource-roles-discover-resources.md
37+
- name: Groups
38+
href: groups-discover-groups.md
3539
- name: Assign
3640
items:
3741
- name: Azure AD roles
3842
href: pim-how-to-add-role-to-user.md
3943
- name: Azure roles
4044
href: pim-resource-roles-assign-roles.md
41-
- name: Privileged Access groups
45+
- name: Groups
4246
href: groups-assign-member-owner.md
4347
- name: Activate
4448
items:
4549
- name: Azure AD roles
4650
href: pim-how-to-activate-role.md
4751
- name: Azure roles
4852
href: pim-resource-roles-activate-your-roles.md
49-
- name: Privileged Access groups
53+
- name: Groups
5054
href: groups-activate-roles.md
5155
- name: Approve
5256
items:
5357
- name: Azure AD roles
5458
href: azure-ad-pim-approval-workflow.md
5559
- name: Azure roles
5660
href: pim-resource-roles-approval-workflow.md
57-
- name: Privileged Access groups
61+
- name: Groups
5862
href: groups-approval-workflow.md
59-
- name: Bring under management
60-
items:
61-
- name: Azure resources
62-
href: pim-resource-roles-discover-resources.md
63-
- name: Privileged Access groups
64-
href: groups-discover-groups.md
6563
- name: Extend or renew
6664
items:
6765
- name: Azure AD roles
6866
href: pim-how-to-renew-extend.md
6967
- name: Azure roles
7068
href: pim-resource-roles-renew-extend.md
71-
- name: Privileged Access groups
69+
- name: Groups
7270
href: groups-renew-extend.md
7371
- name: Set role settings
7472
items:
7573
- name: Azure AD roles
7674
href: pim-how-to-change-default-settings.md
7775
- name: Azure roles
7876
href: pim-resource-roles-configure-role-settings.md
79-
- name: Privileged Access groups
77+
- name: Groups
8078
href: groups-role-settings.md
8179
- name: Set up alerts
8280
items:
@@ -90,7 +88,7 @@
9088
href: pim-how-to-use-audit-log.md
9189
- name: Azure roles
9290
href: azure-pim-resource-rbac.md
93-
- name: Privileged Access groups
91+
- name: Groups
9492
href: groups-audit.md
9593
- name: Review access
9694
items:

0 commit comments

Comments
 (0)