Skip to content

Commit 87027cd

Browse files
authored
Merge pull request #236490 from MicrosoftDocs/main
5/01 PM Publish
2 parents 3fbec33 + ffc27dc commit 87027cd

File tree

103 files changed

+1755
-1178
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

103 files changed

+1755
-1178
lines changed

.openpublishing.redirection.active-directory.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,15 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/active-directory/develop/active-directory-jwt-claims-customization.md",
5+
"redirect_url": "/azure/active-directory/develop/jwt-claims-customization",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path_from_root": "/articles/active-directory/develop/active-directory-saml-claims-customization.md",
10+
"redirect_url": "/azure/active-directory/develop/saml-claims-customization",
11+
"redirect_document_id": false
12+
},
313
{
414
"source_path_from_root": "/articles/active-directory/develop/active-directory-claims-mapping.md",
515
"redirect_url": "/azure/active-directory/develop/active-directory-saml-claims-customization",

articles/active-directory/app-provisioning/workday-integration-reference.md

Lines changed: 67 additions & 67 deletions
Large diffs are not rendered by default.

articles/active-directory/app-proxy/application-proxy-configure-single-sign-on-with-headers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Azure Active Directory (Azure AD) Application Proxy natively supports single sig
2121

2222
* **No additional software or changes to your apps** - You can use your existing Application Proxy connectors and it doesn't require any additional software to be installed.
2323

24-
* **Wide list of attributes and transformations available** - All header values available are based on standard claims that are issued by Azure AD. All attributes and transformations available for [configuring claims for SAML or OIDC applications](../develop/active-directory-saml-claims-customization.md#attributes) are also available to be used as header values.
24+
* **Wide list of attributes and transformations available** - All header values available are based on standard claims that are issued by Azure AD. All attributes and transformations available for [configuring claims for SAML or OIDC applications](../develop/saml-claims-customization.md#attributes) are also available to be used as header values.
2525

2626
## Pre-requisites
2727
Before you get started with single sign-on for header-based authentication apps, make sure your environment is ready with the following settings and configurations:
@@ -72,8 +72,8 @@ Before you get started with single sign-on for header-based applications, you sh
7272
3. In Basic Configuration, **Azure Active Directory**, will be selected as the default.
7373
4. Select the edit pencil, in Headers to configure headers to send to the application.
7474
5. Select **Add new header**. Provide a **Name** for the header and select either **Attribute** or **Transformation** and select from the drop-down which header your application needs.
75-
- To learn more about the list of attribute available, see [Claims Customizations- Attributes](../develop/active-directory-saml-claims-customization.md#attributes).
76-
- To learn more about the list of transformation available, see [Claims Customizations- Claim Transformations](../develop/active-directory-saml-claims-customization.md#claim-transformations).
75+
- To learn more about the list of attribute available, see [Claims Customizations- Attributes](../develop/saml-claims-customization.md#attributes).
76+
- To learn more about the list of transformation available, see [Claims Customizations- Claim Transformations](../develop/saml-claims-customization.md#claim-transformations).
7777
- You may also add a **Group Header**, to send all the groups a user is part of, or the groups assigned to the application as a header. To learn more about configuring groups as a value see: [Configure group claims for applications](../hybrid/how-to-connect-fed-group-claims.md#add-group-claims-to-tokens-for-saml-applications-using-sso-configuration).
7878
6. Select Save.
7979

articles/active-directory/conditional-access/location-condition.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,17 @@ Multiple Conditional Access policies may prompt users for their GPS location bef
102102

103103
Some IP addresses don't map to a specific country or region. To capture these IP locations, check the box **Include unknown countries/regions** when defining a geographic location. This option allows you to choose if these IP addresses should be included in the named location. Use this setting when the policy using the named location should apply to unknown locations.
104104

105+
### Define locations
106+
107+
1. Sign in to the **Azure portal** as a Conditional Access Administrator or Security Administrator.
108+
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access** > **Named locations**.
109+
1. Choose **New location**.
110+
1. Give your location a name.
111+
1. Choose **IP ranges** if you know the specific externally accessible IPv4 address ranges that make up that location or **Countries/Regions**.
112+
1. Provide the **IP ranges** or select the **Countries/Regions** for the location you're specifying.
113+
* If you choose Countries/Regions, you can optionally choose to include unknown areas.
114+
1. Choose **Save**
115+
105116
## Location condition in policy
106117

107118
When you configure the location condition, you can distinguish between:

articles/active-directory/develop/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -443,9 +443,9 @@
443443
- name: Configure role claim
444444
href: active-directory-enterprise-app-role-management.md
445445
- name: Customize JWT claims
446-
href: active-directory-jwt-claims-customization.md
446+
href: jwt-claims-customization.md
447447
- name: Customize SAML claims
448-
href: active-directory-saml-claims-customization.md
448+
href: saml-claims-customization.md
449449
- name: Set an access token lifetime policy
450450
href: configure-token-lifetimes.md
451451
- name: Directory extension attributes

articles/active-directory/develop/active-directory-enterprise-app-role-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,4 +164,4 @@ To delete an existing role, perform the following steps:
164164

165165
## Next steps
166166

167-
- For information about customizing claims, see [Customize claims issued in the SAML token for enterprise applications](active-directory-saml-claims-customization.md).
167+
- For information about customizing claims, see [Customize claims issued in the SAML token for enterprise applications](saml-claims-customization.md).

articles/active-directory/develop/configure-token-lifetimes.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: how-to
12-
ms.date: 04/04/2023
12+
ms.date: 05/01/2023
1313
ms.author: ryanwi
1414
ms.custom: identityplatformtop40, contperf-fy21q2, engagement-fy23
1515
ms.reviewer: ludwignick
@@ -29,6 +29,8 @@ To get started, download the latest [Microsoft Graph PowerShell SDK](/powershell
2929
In the following steps, you'll create a policy that requires users to authenticate less frequently in your web app. This policy sets the lifetime of the access/ID tokens for your web app.
3030

3131
```powershell
32+
Install-Module Microsoft.Graph
33+
3234
Connect-MgGraph -Scopes "Policy.ReadWrite.ApplicationConfiguration","Policy.Read.All","Application.ReadWrite.All"
3335
3436
# Create a token lifetime policy

0 commit comments

Comments
 (0)