Skip to content

Commit 80c32c4

Browse files
committed
2 parents d414cd8 + 280037b commit 80c32c4

File tree

405 files changed

+5211
-3803
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

405 files changed

+5211
-3803
lines changed

articles/active-directory/app-provisioning/user-provisioning.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: app-provisioning
88
ms.topic: overview
99
ms.workload: identity
10-
ms.date: 02/09/2023
10+
ms.date: 02/14/2023
1111
ms.author: kenwith
1212
ms.reviewer: arvinh
1313
---
@@ -20,7 +20,7 @@ In Azure Active Directory (Azure AD), the term *app provisioning* refers to auto
2020

2121
Azure AD application provisioning refers to automatically creating user identities and roles in the applications that users need access to. In addition to creating user identities, automatic provisioning includes the maintenance and removal of user identities as status or roles change. Common scenarios include provisioning an Azure AD user into SaaS applications like [Dropbox](../../active-directory/saas-apps/dropboxforbusiness-provisioning-tutorial.md), [Salesforce](../../active-directory/saas-apps/salesforce-provisioning-tutorial.md), [ServiceNow](../../active-directory/saas-apps/servicenow-provisioning-tutorial.md), and many more.
2222

23-
Azure AD also supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. If your application supports [SCIM](https://aka.ms/scimoverview), or you've built a SCIM gateway to connect to your legacy application, you can use the Azure AD Provisioning agent to [directly connect](./on-premises-scim-provisioning.md) with your application and automate provisioning and deprovisioning. If you have legacy applications that don't support SCIM and rely on an [LDAP](./on-premises-ldap-connector-configure.md) user store or a [SQL](./tutorial-ecma-sql-connector.md) database, Azure AD can support those as well.
23+
Azure AD also supports provisioning users into applications hosted on-premises or in a virtual machine, without having to open up any firewalls. Your application must support [SCIM](https://aka.ms/scimoverview). Or, you must build a SCIM gateway to connect to your legacy application. If so, you can use the Azure AD Provisioning agent to [directly connect](./on-premises-scim-provisioning.md) with your application and automate provisioning and deprovisioning. If you have legacy applications that don't support SCIM and rely on an [LDAP](./on-premises-ldap-connector-configure.md) user store or a [SQL](./tutorial-ecma-sql-connector.md) database, Azure AD can support these applications as well.
2424

2525
App provisioning lets you:
2626

articles/active-directory/conditional-access/overview.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,15 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: overview
9-
ms.date: 11/07/2022
9+
ms.date: 02/13/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
1313
manager: amycolannino
1414
ms.reviewer: calebb
1515

1616
ms.collection: M365-identity-device-management
17-
ms.custom: contperf-fy20q4, azuread-video-2020
17+
ms.custom: zt-include
1818
---
1919
# What is Conditional Access?
2020

@@ -97,6 +97,8 @@ When licenses required for Conditional Access expire, policies aren't automatica
9797

9898
[Security defaults](../fundamentals/concept-fundamentals-security-defaults.md) help protect against identity-related attacks and are available for all customers.
9999

100+
[!INCLUDE [active-directory-zero-trust](../../../includes/active-directory-zero-trust.md)]
101+
100102
## Next steps
101103

102104
- [Building a Conditional Access policy piece by piece](concept-conditional-access-policies.md)

articles/active-directory/develop/scenario-desktop-acquire-token-wam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ Applications cannot remove accounts from Windows!
129129
- Removes app-only (not OS-wide) accounts.
130130

131131
>[!NOTE]
132-
> Ony users can remove OS accounts, whereas apps themselves cannot. If an OS account is passed into `RemoveAsync`, and then `GetAccounts` is called with `ListWindowsWorkAndSchoolAccounts` enabled, the same OS accounts will still be returned.
132+
> Only users can remove OS accounts, whereas apps themselves cannot. If an OS account is passed into `RemoveAsync`, and then `GetAccounts` is called with `ListWindowsWorkAndSchoolAccounts` enabled, the same OS accounts will still be returned.
133133
134134
## Other considerations
135135

articles/active-directory/develop/scenario-web-app-call-api-call-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ public async Task<IActionResult> Profile()
150150
> [!NOTE]
151151
> You can use the same principle to call any web API.
152152
>
153-
> Most Azure web APIs provide an SDK that simplifies calling the API as is the case for Microsoft Graph. See, for instance, [Create a web application that authorizes access to Blob storage with Azure AD](../../storage/common/storage-auth-aad-app.md?tabs=dotnet&toc=%2fazure%2fstorage%2fblobs%2ftoc.json) for an example of a web app using Microsoft.Identity.Web and using the Azure Storage SDK.
153+
> Most Azure web APIs provide an SDK that simplifies calling the API as is the case for Microsoft Graph.
154154
155155
# [Java](#tab/java)
156156

articles/active-directory/develop/v2-oauth2-client-creds-grant-flow.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ https://login.microsoftonline.com/common/adminconsent?client_id=6731de76-14a6-49
106106
| `redirect_uri` | Required | The redirect URI where you want the response to be sent for your app to handle. It must exactly match one of the redirect URIs that you registered in the portal, except that it must be URL-encoded, and it can have additional path segments. |
107107
| `state` | Recommended | A value that's included in the request that's also returned in the token response. It can be a string of any content that you want. The state is used to encode information about the user's state in the app before the authentication request occurred, such as the page or view they were on. |
108108

109-
At this point, Azure AD enforces that only a tenant administrator can sign into complete the request. The administrator will be asked to approve all the direct application permissions that you have requested for your app in the app registration portal.
109+
At this point, Azure AD enforces that only a tenant administrator can sign in to complete the request. The administrator will be asked to approve all the direct application permissions that you have requested for your app in the app registration portal.
110110

111111
##### Successful response
112112

articles/active-directory/external-identities/b2b-tutorial-require-mfa.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: tutorial
9-
ms.date: 01/07/2022
9+
ms.date: 02/03/2023
1010

1111
ms.author: cmulligan
1212
author: csmulligan
@@ -50,7 +50,7 @@ If you don’t have an Azure subscription, create a [free account](https://azure
5050

5151
To complete the scenario in this tutorial, you need:
5252

53-
- **Access to Azure AD Premium edition**, which includes Conditional Access policy capabilities. To enforce MFA, you need to create an Azure AD Conditional Access policy. MFA policies are always enforced at your organization, regardless of whether the partner has MFA capabilities.
53+
- **Access to [Azure AD Premium edition](/security/business/identity-access/azure-active-directory-pricing)**, which includes Conditional Access policy capabilities. To enforce MFA, you need to create an Azure AD Conditional Access policy. MFA policies are always enforced at your organization, regardless of whether the partner has MFA capabilities.
5454
- **A valid external email account** that you can add to your tenant directory as a guest user and use to sign in. If you don't know how to create a guest account, see [Add a B2B guest user in the Azure portal](add-users-administrator.md).
5555

5656
## Create a test guest user in Azure AD

articles/active-directory/external-identities/current-limitations.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,16 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 01/31/2022
9+
ms.date: 02/13/2023
1010

1111
ms.author: mimart
1212
author: msmimart
1313
manager: celestedg
1414
ms.reviewer: elisolMS
1515

16-
ms.collection: M365-identity-device-management
16+
ms.collection: content-health, M365-identity-device-management
17+
18+
# Customer intent: As a tenant administrator, I want to know about the current limitations for Azure AD B2B collaboration.
1719
---
1820

1921
# Limitations of Azure AD B2B collaboration
@@ -23,7 +25,7 @@ Azure Active Directory (Azure AD) B2B collaboration is currently subject to the
2325
With Azure AD B2B, you can enforce multi-factor authentication at the resource organization (the inviting organization). The reasons for this approach are detailed in [Conditional Access for B2B collaboration users](authentication-conditional-access.md). If a partner already has multi-factor authentication set up and enforced, their users might have to perform the authentication once in their home organization and then again in yours.
2426

2527
## Instant-on
26-
In the B2B collaboration flows, we add users to the directory and dynamically update them during invitation redemption, app assignment, and so on. The updates and writes ordinarily happen in one directory instance and must be replicated across all instances. Replication is completed once all instances are updated. Sometimes when the object is written or updated in one instance and the call to retrieve this object is to another instance, replication latencies can occur. If that happens, refresh or retry to help. If you are writing an app using our API, then retries with some back-off is a good, defensive practice to alleviate this issue.
28+
In the B2B collaboration flows, we add users to the directory and dynamically update them during invitation redemption, app assignment, and so on. The updates and writes ordinarily happen in one directory instance and must be replicated across all instances. Replication is completed once all instances are updated. Sometimes when the object is written or updated in one instance and the call to retrieve this object is to another instance, replication latencies can occur. If that happens, refresh or retry to help. If you're writing an app using our API, then retries with some back-off is a good, defensive practice to alleviate this issue.
2729

2830
## Azure AD directories
2931
Azure AD B2B is subject to Azure AD service directory limits. For details about the number of directories a user can create and the number of directories to which a user or guest user can belong, see [Azure AD service limits and restrictions](../enterprise-users/directory-service-limits-restrictions.md).

articles/active-directory/hybrid/TOC.yml

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -68,11 +68,11 @@
6868
href: how-to-connect-fed-compatibility.md
6969
- name: Single sign-on
7070
items:
71-
- name: What is Single Sign-On?
71+
- name: What is single sign-on?
7272
href: how-to-connect-sso.md
73-
- name: How Single Sign-On works
73+
- name: How single sign-on works
7474
href: how-to-connect-sso-how-it-works.md
75-
- name: Single Sign-On and user privacy
75+
- name: Single sign-on and user privacy
7676
href: how-to-connect-sso-user-privacy.md
7777
- name: Azure AD Connect Sync
7878
items:
@@ -105,19 +105,19 @@
105105
items:
106106
- name: Installation Roadmap
107107
href: how-to-connect-install-roadmap.md
108-
- name: Installation Prerequisites
108+
- name: Installation prerequisites
109109
href: how-to-connect-install-prerequisites.md
110110
- name: Choose the installation type
111111
href: how-to-connect-install-select-installation.md
112-
- name: Install Azure AD Connect with Express settings (Password Hash Synch)
112+
- name: Install Azure AD Connect with Express settings (password hash sync)
113113
href: how-to-connect-install-express.md
114-
- name: Install Azure AD Connect Federation or other Custom settings
114+
- name: Install Azure AD Connect federation or other Custom settings
115115
href: how-to-connect-install-custom.md
116116
- name: Import and export configuration settings
117117
href: how-to-connect-import-export-config.md
118-
- name: Install Azure AD Connect with Pass-through Authentication (PTA)
118+
- name: Install Azure AD Connect with pass-through authentication
119119
href: how-to-connect-pta-quick-start.md
120-
- name: Install Azure AD Connect Health
120+
- name: Install Azure AD Connect Health agents
121121
href: how-to-connect-health-agent-install.md
122122
- name: Automatic upgrade
123123
href: how-to-connect-install-automatic-upgrade.md
@@ -151,7 +151,7 @@
151151
href: plan-connect-topologies.md
152152
- name: Factors influencing the performance of Azure AD Connect
153153
href: plan-connect-performance-factors.md
154-
- name: How will users sign-in
154+
- name: How will users sign in
155155
href: plan-connect-user-signin.md
156156
- name: Azure AD UserPrincipalName population
157157
href: plan-connect-userprincipalname.md
@@ -259,10 +259,10 @@
259259
- name: Manage single sign-on
260260
items:
261261

262-
- name: Get started with Single Sign-On
262+
- name: Get started with Seamless single sign-on
263263
href: how-to-connect-sso-quick-start.md
264264

265-
- name: Single Sign-On FAQ
265+
- name: Single sign-on FAQ
266266
href: how-to-connect-sso-faq.yml
267267
- name: Manage Azure AD Connect Health
268268
items:

articles/active-directory/hybrid/concept-azure-ad-connect-sync-declarative-provisioning.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ In the attribute flows there is a setting to determine if multi-valued attribute
9898

9999
![Screenshot that shows the "Add transformations" section with the "Merge Types" drop-down menu open.](./media/concept-azure-ad-connect-sync-declarative-provisioning/mergetype.png)
100100

101-
There is also **Merge** and **MergeCaseInsensitive**. These options allow you to merge values from different sources. For example, it can be used to merge the member or proxyAddresses attribute from several different forests. When you use this option, all sync rules in scope for an object must use the same merge type. You cannot define **Update** from one Connector and **Merge** from another. If you try, you receive an error.
101+
There is also **Merge** and **MergeCaseInsensitive**. These options allow you to merge values from different sources. For example, it can be used to merge the proxyAddresses attribute from several different forests. When you use this option, all sync rules in scope for an object must use the same merge type. You cannot define **Update** from one Connector and **Merge** from another. If you try, you receive an error.
102102

103103
The difference between **Merge** and **MergeCaseInsensitive** is how to process duplicate attribute values. The sync engine makes sure duplicate values are not inserted into the target attribute. With **MergeCaseInsensitive**, duplicate values with only a difference in case are not going to be present. For example, you should not see both "SMTP:bob@contoso.com" and "smtp:bob@contoso.com" in the target attribute. **Merge** is only looking at the exact values and multiple values where there only is a difference in case might be present.
104104

@@ -122,14 +122,20 @@ In *Out to AD - User Exchange hybrid* the following flow can be found:
122122
This expression should be read as: if the user mailbox is located in Azure AD, then flow the attribute from Azure AD to AD. If not, do not flow anything back to Active Directory. In this case, it would keep the existing value in AD.
123123

124124
### ImportedValue
125-
The function ImportedValue is different than all other functions since the attribute name must be enclosed in quotes rather than square brackets:
125+
126+
The function ImportedValue is different than all other functions since the attribute name must be enclosed in quotes rather than square brackets:
127+
126128
`ImportedValue("proxyAddresses")`.
127129

128-
Usually during synchronization an attribute uses the expected value, even if it hasn’t been exported yet or an error was received during export (“top of the tower”). An inbound synchronization assumes that an attribute that hasn’t yet reached a connected directory eventually reaches it. In some cases, it is important to only synchronize a value that has been confirmed by the connected directory (“hologram and delta import tower”).
130+
Inbound synchronization has a concept of assuming that an attribute that hasn’t yet reached a connected directory will eventually reach it at some point so, normally, synchronization gets an attribute value from the respective connector space, even if it hasn’t been yet exported or an error occurred during export.
131+
In some cases, however, it is important to only synchronize a value that has been exported and confirmed during import from the connected directory. This function can be found in multiple “In From AD/AAD” out-of-box transformation rules where the attribute should only be synchronized when it has been confirmed that the value was exported successfully.
132+
133+
An example of this function can be found in the out-of-box Synchronization Rule *In from AD – User Common from Exchange*, for ProxyAddresses attribute flow with Hybrid Exchange. E.g., when a user’s ProxyAddresses is added, the ImportedValue function will only return the new value after it has been confirmed from the following import step:
129134

130-
An example of this function can be found in the out-of-box Synchronization Rule *In from AD – User Common from Exchange*. In Hybrid Exchange, the value added by Exchange online should only be synchronized when it has been confirmed that the value was exported successfully:
131135
`proxyAddresses` <- `RemoveDuplicates(Trim(ImportedValue("proxyAddresses")))`
132136

137+
This function is required when the target directory might change or discard an exported attribute value silently, and we want the synchronization to only process confirmed attribute values.
138+
133139
## Precedence
134140
When several sync rules try to contribute the same attribute value to the target, the precedence value is used to determine the winner. The rule with highest precedence, lowest numeric value, is going to contribute the attribute in a conflict.
135141

@@ -140,11 +146,9 @@ This ordering can be used to define more precise attribute flows for a small sub
140146
Precedence can be defined between Connectors. That allows Connectors with better data to contribute values first.
141147

142148
### Multiple objects from the same connector space
143-
If you have several objects in the same connector space joined to the same metaverse object, precedence must be adjusted. If several objects are in scope of the same sync rule, then the sync engine is not able to determine precedence. It is ambiguous which source object should contribute the value to the metaverse. This configuration is reported as ambiguous even if the attributes in the source have the same value.
144-
![Diagram that shows multiple objects joined to the same mv object with a transparent red X overlay. ](./media/concept-azure-ad-connect-sync-declarative-provisioning/multiple1.png)
149+
It is not possible to have several objects in the same connector space joined to the same metaverse object. This configuration is reported as ambiguous even if the attributes in the source have the same value.
145150

146-
For this scenario, you need to change the scope of the sync rules so the source objects have different sync rules in scope. That allows you to define different precedence.
147-
![Multiple objects joined to the same mv object](./media/concept-azure-ad-connect-sync-declarative-provisioning/multiple2.png)
151+
![Diagram that shows multiple objects joined to the same mv object with a transparent red X overlay. ](./media/concept-azure-ad-connect-sync-declarative-provisioning/multiple1.png)
148152

149153
## Next steps
150154
* Read more about the expression language in [Understanding Declarative Provisioning Expressions](concept-azure-ad-connect-sync-declarative-provisioning-expressions.md).

articles/active-directory/hybrid/how-to-connect-group-writeback-v2.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -136,11 +136,6 @@ These limitations and known issues are specific to group writeback:
136136
- Nested cloud groups that are members of writeback enabled groups must also be enabled for writeback to remain nested in AD.
137137
- Group Writeback setting to manage new security group writeback at scale is not yet available. You will need to configure writeback for each group. 
138138

139-
If you have a nested group like this, you'll see an export error in Azure AD Connect with the message "A universal group cannot have a local group as a member." The resolution is to remove the member with the **Domain local** scope from the Azure AD group, or update the nested group member scope in Active Directory to **Global** or **Universal**.
140-
- Group writeback supports writing back groups to only a single organizational unit (OU). After the feature is enabled, you can't change the OU that you selected. A workaround is to disable group writeback entirely in Azure AD Connect and then select a different OU when you re-enable the feature. 
141-
- Nested cloud groups that are members of writeback-enabled groups must also be enabled for writeback to remain nested in Active Directory.
142-
- A group writeback setting to manage new security group writeback at scale is not yet available. You need to configure writeback for each group. 
143-
144139
## Next steps
145140

146141
- [Modify Azure AD Connect group writeback default behavior](how-to-connect-modify-group-writeback.md)

0 commit comments

Comments
 (0)