Skip to content

Commit 80d5f40

Browse files
authored
Merge pull request #249835 from MicrosoftDocs/main
8/30/2023 AM Publish
2 parents 0e11dc2 + 55a6912 commit 80d5f40

File tree

151 files changed

+1538
-1185
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

151 files changed

+1538
-1185
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1091,6 +1091,7 @@
10911091
"articles/azure-video-indexer/.openpublishing.redirection.azure-video-indexer.json",
10921092
"articles/cloud-shell/.openpublishing.redirection.cloud-shell.json",
10931093
"articles/communication-services/.openpublishing.redirection.communication-services.json",
1094+
"articles/communications-gateway/.openpublishing.redirection.communications-gateway.json",
10941095
"articles/confidential-computing/.openpublishing.redirection.json",
10951096
"articles/container-apps/.openpublishing.redirection.container-apps.json",
10961097
"articles/cosmos-db/.openpublishing.redirection.cosmos-db.json",

.openpublishing.redirection.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23792,11 +23792,6 @@
2379223792
"redirect_url": "/azure/private-5g-core/monitor-private-5g-core-with-platform-metrics",
2379323793
"redirect_document_id": false
2379423794
},
23795-
{
23796-
"source_path": "articles/communications-gateway/rotate-secrets.md",
23797-
"redirect_URL": "/azure/communications-gateway/whats-new",
23798-
"redirect_document_id": false
23799-
},
2380023795
{
2380123796
"source_path": "articles/batch/high-availability-disaster-recovery.md",
2380223797
"redirect_URL": "/azure/reliability/reliability-batch",
@@ -24266,6 +24261,11 @@
2426624261
"source_path_from_root": "/articles/reliability/reliability-postgre-flexible.md",
2426724262
"redirect_url": "/azure/reliability/reliability-postgresql-flexible-server",
2426824263
"redirect_document_id": false
24264+
},
24265+
{
24266+
"source_path_from_root": "/articles/private-link/tutorial-private-endpoint-cosmosdb-portal.md",
24267+
"redirect_url": "/azure/cosmos-db/how-to-configure-private-endpoints",
24268+
"redirect_document_id": false
2426924269
}
2427024270
]
2427124271
}

.openpublishing.redirection.virtual-desktop.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,11 @@
194194
"source_path_from_root": "/articles/virtual-desktop/app-attach-glossary.md",
195195
"redirect_url": "/azure/virtual-desktop/what-is-app-attach",
196196
"redirect_document_id": false
197+
},
198+
{
199+
"source_path_from_root": "/articles/virtual-desktop/windows-10-multisession-faq.yml",
200+
"redirect_url": "/azure/virtual-desktop/windows-multisession-faq",
201+
"redirect_document_id": true
197202
}
198203
]
199204
}

articles/active-directory/authentication/howto-mfa-userdevicesettings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: multi-factor-authentication
66
ms.service: active-directory
77
ms.subservice: authentication
88
ms.topic: how-to
9-
ms.date: 07/05/2023
9+
ms.date: 08/29/2023
1010

1111
ms.author: justinha
1212
author: justinha
@@ -58,7 +58,7 @@ Install the Microsoft.Graph.Identity.Signins PowerShell module using the followi
5858

5959
```powershell
6060
Install-module Microsoft.Graph.Identity.Signins
61-
Connect-MgGraph -Scopes UserAuthenticationMethod.ReadWrite.All
61+
Connect-MgGraph -Scopes "User.Read.all","UserAuthenticationMethod.Read.All","UserAuthenticationMethod.ReadWrite.All"
6262
Select-MgProfile -Name beta
6363
```
6464

articles/active-directory/develop/authentication-national-cloud.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Including the global Azure cloud, Azure Active Directory (Azure AD) is deplo
2525
- Microsoft Azure operated by 21Vianet
2626
- Azure Germany ([Closed on October 29, 2021](https://www.microsoft.com/cloud-platform/germany-cloud-regions)). Learn more about [Azure Germany migration](#azure-germany-microsoft-cloud-deutschland).
2727

28-
The individual national clouds and the global Azure cloud are cloud _instances_. Each cloud instance is separate from the others and has its own environment and _endpoints_. Cloud-specific endpoints include OAuth 2.0 access token and OpenID Connect ID token request endpoints, and URLs for app management and deployment, like the Azure portal.
28+
The individual national clouds and the global Azure cloud are cloud _instances_. Each cloud instance is separate from the others and has its own environment and _endpoints_. Cloud-specific endpoints include OAuth 2.0 access token and OpenID Connect ID token request endpoints, and URLs for app management and deployment.
2929

3030
As you develop your apps, use the endpoints for the cloud instance where you'll deploy the application.
3131

@@ -43,13 +43,13 @@ The following table lists the base URLs for the Azure AD endpoints used to regis
4343

4444
## Application endpoints
4545

46-
You can find the authentication endpoints for your application in the Azure portal.
46+
You can find the authentication endpoints for your application.
4747

48-
1. Sign in to the <a href="https://portal.azure.com/" target="_blank">Azure portal</a>.
49-
1. Select **Azure Active Directory**.
50-
1. Under **Manage**, select **App registrations**, and then select **Endpoints** in the top menu.
48+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Cloud Application Administrator](../roles/permissions-reference.md#cloud-application-administrator).
49+
1. Browse to **Identity** > **Applications** > **Application registrations**.
50+
1. Select **Endpoints** in the top menu.
5151

52-
The **Endpoints** page is displayed showing the authentication endpoints for the application registered in your Azure AD tenant.
52+
The **Endpoints** page is displayed showing the authentication endpoints for the application.
5353

5454
Use the endpoint that matches the authentication protocol you're using in conjunction with the **Application (client) ID** to craft the authentication request specific to your application.
5555

articles/active-directory/develop/v2-oauth2-on-behalf-of-flow.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,8 @@ This access token is a v1.0-formatted token for Microsoft Graph. This is because
164164

165165
An error response is returned by the token endpoint when trying to acquire an access token for the downstream API, if the downstream API has a Conditional Access policy (such as [multifactor authentication](../authentication/concept-mfa-howitworks.md)) set on it. The middle-tier service should surface this error to the client application so that the client application can provide the user interaction to satisfy the Conditional Access policy.
166166

167+
To [surface this error back](https://datatracker.ietf.org/doc/html/rfc6750#section-3.1) to the client, the middle-tier service will reply with HTTP 401 Unauthorized and with a WWW-Authenticate HTTP header containing the error and the claim challenge. The client must parse this header and acquire a new token from the token issuer, by presenting the claims challenge if one exists. Clients should not retry to access the middle-tier service using a cached access token.
168+
167169
```json
168170
{
169171
"error":"interaction_required",

articles/active-directory/external-identities/claims-mapping.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: B2B
88
ms.topic: conceptual
9-
ms.date: 11/24/2022
9+
ms.date: 08/30/2023
1010

1111
ms.author: cmulligan
1212
author: csmulligan
@@ -32,7 +32,16 @@ There are two possible reasons why you might need to edit the claims that are is
3232

3333
For information about how to add and edit claims, see [Customizing claims issued in the SAML token for enterprise applications in Azure Active Directory](../develop/saml-claims-customization.md).
3434

35-
For B2B collaboration users, mapping NameID and UPN cross-tenant are prevented for security reasons.
35+
## UPN claims behavior for B2B users
36+
37+
If you need to issue the UPN value as an application token claim, the actual claim mapping may behave differently for B2B users. If the B2B user authenticates with an external Azure AD identity and you issue user.userprincipalname as the source attribute, Azure AD instead issues the mail attribute.
38+
39+
For example, let’s say you invite an external user whose email is `[email protected]` and whose identity exists in an external Azure AD tenant. James’ UPN in the inviting tenant is created from the invited email and the inviting tenant's original default domain. So, let’s say James’ UPN becomes `James_contoso.com#EXT#@fabrikam.onmicrosoft.com`. For the SAML application that issues user.userprincipalname as the NameID, the value passed for James is `[email protected]`.
40+
41+
All [other external identity types](redemption-experience.md#invitation-redemption-flow) such as SAML/WS-Fed, Google, Email OTP issues the UPN value rather than the email value when you issue user.userprincipalname as a claim. If you want the actual UPN to be issued in the token claim for all B2B users, you can set user.localuserprincipalname as the source attribute instead.
42+
43+
>[!NOTE]
44+
>The behavior mentioned in this section is same for both cloud-only B2B users and synced users who were [invited/converted to B2B collaboration](invite-internal-users.md).
3645
3746
## Next steps
3847

articles/active-directory/external-identities/cross-tenant-access-overview.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,9 @@ ms.collection: M365-identity-device-management
1919
Azure AD organizations can use External Identities cross-tenant access settings to manage how they collaborate with other Azure AD organizations and other Microsoft Azure clouds through B2B collaboration and [B2B direct connect](cross-tenant-access-settings-b2b-direct-connect.md). [Cross-tenant access settings](cross-tenant-access-settings-b2b-collaboration.md) give you granular control over how external Azure AD organizations collaborate with you (inbound access) and how your users collaborate with external Azure AD organizations (outbound access). These settings also let you trust multi-factor authentication (MFA) and device claims ([compliant claims and hybrid Azure AD joined claims](../conditional-access/howto-conditional-access-policy-compliant-device.md)) from other Azure AD organizations.
2020

2121
This article describes cross-tenant access settings, which are used to manage B2B collaboration and B2B direct connect with external Azure AD organizations, including across Microsoft clouds. More settings are available for B2B collaboration with non-Azure AD identities (for example, social identities or non-IT managed external accounts). These [external collaboration settings](external-collaboration-settings-configure.md) include options for restricting guest user access, specifying who can invite guests, and allowing or blocking domains.
22+
23+
> [!IMPORTANT]
24+
> Microsoft is beginning to move customers using cross-tenant access settings to a new storage model on August 30, 2023. You may notice an entry in your audit logs informing you that your cross-tenant access settings were updated as our automated task migrates your settings. For a brief window while the migration processes, you will be unable to make changes to your settings. If you are unable to make a change, you should wait a few moments and try the change again. Once the migration completes, [you will no longer be capped with 25kb of storage space](/azure/active-directory/external-identities/faq#how-many-organizations-can-i-add-in-cross-tenant-access-settings-) and there will be no more limits on the number of partners you can add.
2225
2326
## Manage external access with inbound and outbound settings
2427

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-collaboration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,9 @@ ms.collection: M365-identity-device-management
1818

1919
Use External Identities cross-tenant access settings to manage how you collaborate with other Azure AD organizations through B2B collaboration. These settings determine both the level of *inbound* access users in external Azure AD organizations have to your resources, and the level of *outbound* access your users have to external organizations. They also let you trust multi-factor authentication (MFA) and device claims ([compliant claims and hybrid Azure AD joined claims](../conditional-access/howto-conditional-access-policy-compliant-device.md)) from other Azure AD organizations. For details and planning considerations, see [Cross-tenant access in Azure AD External Identities](cross-tenant-access-overview.md).
2020

21+
> [!IMPORTANT]
22+
> Microsoft is beginning to move customers using cross-tenant access settings to a new storage model on August 30, 2023. You may notice an entry in your audit logs informing you that your cross-tenant access settings were updated as our automated task migrates your settings. For a brief window while the migration processes, you will be unable to make changes to your settings. If you are unable to make a change, you should wait a few moments and try the change again. Once the migration completes, [you will no longer be capped with 25kb of storage space](/azure/active-directory/external-identities/faq#how-many-organizations-can-i-add-in-cross-tenant-access-settings-) and there will be no more limits on the number of partners you can add.
23+
2124
## Before you begin
2225

2326
> [!CAUTION]

articles/active-directory/external-identities/cross-tenant-access-settings-b2b-direct-connect.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ Use cross-tenant access settings to manage how you collaborate with other Azure
2727

2828
Learn more about using cross-tenant access settings to [manage B2B direct connect](b2b-direct-connect-overview.md#managing-cross-tenant-access-for-b2b-direct-connect).
2929

30+
> [!IMPORTANT]
31+
> Microsoft is beginning to move customers using cross-tenant access settings to a new storage model on August 30, 2023. You may notice an entry in your audit logs informing you that your cross-tenant access settings were updated as our automated task migrates your settings. For a brief window while the migration processes, you will be unable to make changes to your settings. If you are unable to make a change, you should wait a few moments and try the change again. Once the migration completes, [you will no longer be capped with 25kb of storage space](/azure/active-directory/external-identities/faq#how-many-organizations-can-i-add-in-cross-tenant-access-settings-) and there will be no more limits on the number of partners you can add.
32+
3033
## Before you begin
3134

3235
- Review the [Important considerations](cross-tenant-access-overview.md#important-considerations) section in the [cross-tenant access overview](cross-tenant-access-overview.md) before configuring your cross-tenant access settings.

0 commit comments

Comments
 (0)