Skip to content

Commit 89defef

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents fe5218d + 5952272 commit 89defef

File tree

683 files changed

+12331
-11182
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

683 files changed

+12331
-11182
lines changed

.openpublishing.redirection.defender-for-iot.json

Lines changed: 42 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,44 @@
11
{
22
"redirections": [
3+
{
4+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-activate-and-set-up-your-on-premises-management-console.md",
5+
"redirect_url": "/azure/defender-for-iot/organizations/ot-deploy/activate-deploy-management",
6+
"redirect_document_id": false
7+
}, {
8+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-activate-and-set-up-your-sensor.md",
9+
"redirect_url": "/azure/defender-for-iot/organizations/ot-deploy/activate-deploy-sensor",
10+
"redirect_document_id": false
11+
}, {
12+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-deploy-certificates.md",
13+
"redirect_url": "/azure/defender-for-iot/organizations/ot-deploy/activate-deploy-sensor#deploy-an-ssltls-certificate",
14+
"redirect_document_id": false
15+
}, {
16+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-enhance-port-and-vlan-name-resolution.md",
17+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-control-what-traffic-is-monitored#customize-port-and-vlan-names",
18+
"redirect_document_id": false
19+
}, {
20+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-gain-insight-into-global-regional-and-local-threats.md",
21+
"redirect_url": "/azure/defender-for-iot/organizations/monitor-zero-trust",
22+
"redirect_document_id": false
23+
}, {
24+
"source_path_from_root": "/articles/defender-for-iot/organizations/traffic-mirroring/configure-mirror-tap.md",
25+
"redirect_url": "/azure/defender-for-iot/organizations/best-practices/traffic-mirroring-methods#active-or-passive-aggregation-tap",
26+
"redirect_document_id": false
27+
}, {
28+
"source_path_from_root": "/articles/defender-for-iot/organizations/pre-deployment-checklist.md",
29+
"redirect_url": "/azure/defender-for-iot/organizations/ot-deploy/ot-deploy-path",
30+
"redirect_document_id": false
31+
},
32+
{
33+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-troubleshoot-the-sensor-and-on-premises-management-console.md",
34+
"redirect_url": "/azure/defender-for-iot/organizations/how-to-troubleshoot-sensor",
35+
"redirect_document_id": false
36+
},
37+
{
38+
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-set-up-your-network.md",
39+
"redirect_url": "/azure/defender-for-iot/organizations/best-practices/plan-prepare-deploy",
40+
"redirect_document_id": false
41+
},
342
{
443
"source_path_from_root": "/articles/defender-for-iot/organizations/how-to-work-with-device-notifications.md",
544
"redirect_url": "/azure/defender-for-iot/organizations/how-to-work-with-the-sensor-device-map#manage-device-notifications-from-an-ot-sensor-device-map",
@@ -136,7 +175,7 @@
136175
},
137176
{
138177
"source_path_from_root": "/articles/defender-for-iot/how-to-set-up-your-network.md",
139-
"redirect_url": "/azure/defender-for-iot/organizations/how-to-set-up-your-network",
178+
"redirect_url": "/azure/defender-for-iot/organizations/best-practices/plan-prepare-deploy",
140179
"redirect_document_id": false
141180
},
142181
{
@@ -151,7 +190,7 @@
151190
},
152191
{
153192
"source_path_from_root": "/articles/defender-for-iot/how-to-activate-and-set-up-your-on-premises-management-console.md",
154-
"redirect_url": "/azure/defender-for-iot/organizations/how-to-activate-and-set-up-your-on-premises-management-console",
193+
"redirect_url": "/azure/defender-for-iot/organizations/ot-deploy/activate-deploy-management",
155194
"redirect_document_id": false
156195
},
157196
{
@@ -256,7 +295,7 @@
256295
},
257296
{
258297
"source_path_from_root": "/articles/defender-for-iot/how-to-gain-insight-into-global-regional-and-local-threats.md",
259-
"redirect_url": "/azure/defender-for-iot/organizations/how-to-gain-insight-into-global-regional-and-local-threats",
298+
"redirect_url": "/azure/defender-for-iot/organizations/monitor-zero-trust",
260299
"redirect_document_id": false
261300
},
262301
{
@@ -677,5 +716,3 @@
677716
]
678717
}
679718

680-
681-

articles/active-directory/authentication/how-to-mfa-authenticator-lite.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,6 @@ ms.collection: M365-identity-device-management
1919
---
2020
# How to enable Microsoft Authenticator Lite for Outlook mobile (preview)
2121

22-
>[!NOTE]
23-
>Rollout has not yet completed across Outlook applications. If this feature is enabled in your tenant, your users may not yet be prompted for the experience. To minimize user disruption, we recommend enabling this feature when the rollout completes.
2422

2523
Microsoft Authenticator Lite is another surface for Azure Active Directory (Azure AD) users to complete multifactor authentication by using push notifications or time-based one-time passcodes (TOTP) on their Android or iOS device. With Authenticator Lite, users can satisfy a multifactor authentication requirement from the convenience of a familiar app. Authenticator Lite is currently enabled in [Outlook mobile](https://www.microsoft.com/microsoft-365/outlook-mobile-for-android-and-ios).
2624

@@ -38,8 +36,8 @@ Users receive a notification in Outlook mobile to approve or deny sign-in, or th
3836

3937
| Operating system | Outlook version |
4038
|:----------------:|:---------------:|
41-
|Android | 4.2309.1 |
42-
|iOS | 4.2309.0 |
39+
|Android | 4.2310.1 |
40+
|iOS | 4.2312.1 |
4341

4442
## Enable Authenticator Lite
4543

@@ -52,7 +50,8 @@ By default, Authenticator Lite is [Microsoft managed](concept-authentication-def
5250

5351
To enable Authenticator Lite in the Azure portal, complete the following steps:
5452

55-
1. In the Azure portal, click Security > Authentication methods > Microsoft Authenticator.
53+
1. In the Azure portal, click Azure Active Directory > Security > Authentication methods > Microsoft Authenticator.
54+
In the Entra admin center, on the sidebar select Azure Active Directory > Protect & Secure > Authentication methods > Microsoft Authenticator.
5655

5756
2. On the Enable and Target tab, click Yes and All users to enable the policy for everyone or add selected users and groups. Set the Authentication mode for these users/groups to Any or Push.
5857

articles/active-directory/develop/security-best-practices-for-app-registration.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,7 @@ Certificates and secrets, also known as credentials, are a vital part of an appl
6262
Consider the following guidance related to certificates and secrets:
6363

6464
- Always use [certificate credentials](./active-directory-certificate-credentials.md) whenever possible and don't use password credentials, also known as *secrets*. While it's convenient to use password secrets as a credential, when possible use x509 certificates as the only credential type for getting tokens for an application.
65+
- Configure [application authentication method policies](/graph/api/resources/applicationauthenticationmethodpolicy) to govern the use of secrets by limiting their lifetimes or blocking their use altogether.
6566
- Use Key Vault with [managed identities](../managed-identities-azure-resources/overview.md) to manage credentials for an application.
6667
- If an application is used only as a Public Client App (allows users to sign in using a public endpoint), make sure that there are no credentials specified on the application object.
6768
- Review the credentials used in applications for freshness of use and their expiration. An unused credential on an application can result in a security breach. Rollover credentials frequently and don't share credentials across applications. Don't have many credentials on one application.

articles/active-directory/governance/configure-logic-app-lifecycle-workflows.md

Lines changed: 63 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: owinfreyATL
55
ms.author: owinfrey
66
ms.service: active-directory
77
ms.topic: reference
8-
ms.date: 01/26/2023
8+
ms.date: 03/17/2023
99
ms.custom: template-how-to
1010
---
1111

@@ -15,16 +15,32 @@ ms.custom: template-how-to
1515

1616
Before you can use an existing Azure Logic App with the custom task extension feature of Lifecycle Workflows, it must first be made compatible. This reference guide provides a list of steps that must be taken to make the Azure Logic App compatible. For a guide on creating a new compatible Logic App via the Lifecycle Workflows portal, see [Trigger Logic Apps based on custom task extensions (preview)](trigger-custom-task.md).
1717

18+
## Determine type of token security of your custom task extension
19+
20+
Before configuring your Azure Logic App custom extension for use with Lifecycle Workflows, you must first figure out what type of token security it has. The two token security types can either be:
21+
22+
- Normal
23+
- Proof of Possession(POP)
24+
25+
26+
To determine the security token type of your custom task extension, you'd check the **Custom extensions (Preview)** page:
27+
28+
:::image type="content" source="media/configure-logic-app-lifecycle-workflows/custom-task-extension-token-type.png" alt-text="Screenshot of custom task extension and token type.":::
29+
30+
31+
> [!NOTE]
32+
> New custom task extensions will only have Proof of Possession(POP) token security type. Only task extensions created before the inclusion of the Proof of Possession token security type will have a type of Normal.
33+
1834
## Configure existing Logic Apps for LCW use
1935

2036
Making an Azure Logic app compatible to run with the **Custom Task Extension** requires the following steps:
2137

2238
- Configure the logic app trigger
23-
- Configure the callback action (only applicable to the callback scenario)
24-
- Enable system assigned managed identity.
25-
- Configure AuthZ policies.
39+
- Configure the callback action (Only applicable to the callback scenario.)
40+
- Enable system assigned managed identity (Always required for Normal security token type extensions. This is also the default for callback scenarios with custom task extensions. For more information on this, and other, custom task extension deployment scenarios, see: [Custom task extension deployment scenarios](lifecycle-workflow-extensibility.md#custom-task-extension-deployment-scenarios).)
41+
- Configure AuthZ policies
2642

27-
To configure those you'll follow these steps:
43+
To configure those you follow these steps:
2844

2945
1. Open the Azure Logic App you want to use with Lifecycle Workflow. Logic Apps may greet you with an introduction screen, which you can close with the X in the upper right corner.
3046

@@ -202,21 +218,59 @@ To configure those you'll follow these steps:
202218
203219
1. Select Save.
204220
205-
1. For Logic Apps authorization policy, we'll need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure portal** to find the required Application ID.
221+
## Configure authorization policy for custom task extension with POP security token type
222+
If the security token type is **Proof of Possession (POP)** for your custom task extension, you'd set the authorization policy by following these steps:
223+
224+
1. For Logic Apps authorization policy, we need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure AD Portal** to find the required Application ID.
206225
207226
1. Go back to the logic app you created, and select **Authorization**.
208227
209-
1. Create two authorization policies based on the tables below:
228+
1. Create two authorization policies based on these tables:
210229
211-
Policy name: AzureADLifecycleWorkflowsAuthPolicy
230+
Policy name: POP-Policy
231+
232+
Policy type: (Preview) AADPOP
233+
234+
|Claim |Value |
235+
|---------|---------|
236+
|Issuer | https://sts.windows.net/(Tenant ID)/ |
237+
|appid | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
238+
|m | POST |
239+
|u | management.azure.com |
240+
|p | /subscriptions/(subscriptionId)/resourceGroups/(resourceGroupName)/providers/Microsoft.Logic/workflows/(LogicApp name) |
241+
242+
243+
1. Save the Authorization policy.
244+
245+
246+
> [!CAUTION]
247+
> Please pay attention to the details as minor differences can lead to problems later.
248+
- For Issuer, ensure you did include the slash after your Tenant ID
249+
- For appid, ensure the custom claim is “appid” in all lowercase. The appid value represents Lifecycle Workflows and is always the same.
250+
251+
## Configure authorization policy for custom task extension with normal security token type
252+
253+
If the security token type is **Normal** for your custom task extension, you'd set the authorization policy by following these steps:
254+
255+
1. For Logic Apps authorization policy, we need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure AD Portal** to find the required Application ID.
256+
257+
1. Go back to the logic app you created, and select **Authorization**.
258+
259+
1. Create two authorization policies based on these tables:
260+
261+
Policy name: AzureADLifecycleWorkflowsAuthPolicy
262+
263+
Policy type: AAD
212264
213265
|Claim |Value |
214266
|---------|---------|
215267
|Issuer | https://sts.windows.net/(Tenant ID)/ |
216268
|Audience | Application ID of your Logic Apps Managed Identity |
217269
|appid | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
218270
219-
Policy name: AzureADLifecycleWorkflowsAuthPolicyV2App
271+
Policy name: AzureADLifecycleWorkflowsAuthPolicyV2App
272+
273+
Policy type: AAD
220274
221275
|Claim |Value |
222276
|---------|---------|
@@ -225,8 +279,6 @@ To configure those you'll follow these steps:
225279
|azp | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
226280
227281
1. Save the Authorization policy.
228-
> [!NOTE]
229-
> Due to a current bug in the Logic Apps UI you may have to save the authorization policy after each claim before adding another.
230282
231283
> [!CAUTION]
232284
> Please pay attention to the details as minor differences can lead to problems later.

articles/active-directory/governance/entitlement-management-logic-apps-integration.md

Lines changed: 17 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ These triggers to Logic Apps are controlled in a tab within access package polic
7070
1. The **Extension Configuration** tab allows you to decide if your extension has “launch and continue” or “launch and wait” behavior. With “Launch and continue” the linked policy action on the access package, such as a request, triggers the Logic App attached to the custom extension. After the Logic App is triggered, the entitlement management process associated with the access package will continue. For “Launch and wait”, we'll pause the associated access package action until after the Logic App linked to the extension completes its task, and a resume action is sent by the admin to continue the process. If no response is sent back in the wait time period defined, this process would be considered a failure. This process is further described below in its own section [Configuring custom extensions that pause entitlement management processes](entitlement-management-logic-apps-integration.md#configuring-custom-extensions-that-pause-entitlement-management-processes).
7171

7272

73-
1. In the **Details** tab, choose whether you’d like to use an existing Logic App. Selecting Yes in the field “Create new logic app” (default) creates a new blank Logic App that is already linked to this custom extension. Regardless, you need to provide:
73+
1. In the **Details** tab, choose whether you’d like to use an existing consumption plan Logic App. Selecting Yes in the field “Create new logic app” (default) creates a new blank consumption plan Logic App that is already linked to this custom extension. Regardless, you need to provide:
7474

7575
1. An Azure subscription.
7676

@@ -161,7 +161,7 @@ A new update to the custom extensions feature is the ability to pause the access
161161

162162
This pause process allows admins to have control of workflows they’d like to run before continuing with access lifecycle tasks in entitlement management. The only exception to this is if a timeout occurs. Launch and wait processes require a timeout of up to 14 days noted in minutes, hours, or days. If a resume response isn't sent back to entitlement management by the time the “timeout” period elapses, the entitlement management request workflow process pauses.
163163

164-
The admin is responsible for configuring an automated process that is able to send the API **resume request** payload back to entitlement management, once the Logic App workflow has completed. To send back the resume request payload, follow the instructions here in the graph API documents. See information here on the [resume request](/graph/api/accesspackageassignmentrequest-resume)
164+
The admin is responsible for configuring an automated process that is able to send the API **resume request** payload back to entitlement management, once the Logic App workflow has completed. To send back the resume request payload, follow the instructions here in the graph API documents. See information here on the [resume request](/graph/api/accesspackageassignmentrequest-resume).
165165

166166
Specifically, when an access package policy has been enabled to call out a custom extension and the request processing is waiting for the callback from the customer, the customer can initiate a resume action. It's performed on an [accessPackageAssignmentRequest](/graph/api/resources/accesspackageassignmentrequest) object whose **requestStatus** is in a **WaitingForCallback** state.
167167

@@ -171,12 +171,25 @@ The resume request can be sent back for the following stages:
171171
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestCreated
172172
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestApproved
173173
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestGranted
174-
Microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestRemoved
174+
microsoft.graph.accessPackageCustomExtensionStage.assignmentRequestRemoved
175175
``
176176

177177
The following flow diagram shows the entitlement management callout to Logic Apps workflow:
178-
:::image type="content" source="media/entitlement-management-logic-apps/extensibility-diagram-flow.png" alt-text="A screenshot of the extensibility user diagram." lightbox="media/entitlement-management-logic-apps/extensibility-diagram-flow.png":::
178+
:::image type="content" source="media/entitlement-management-logic-apps/extensibility-diagram-flow.png" alt-text="A diagram of the entitlement management call to the logic apps workflow." lightbox="media/entitlement-management-logic-apps/extensibility-diagram-flow.png":::
179179

180+
The diagram flow diagram shows:
181+
182+
1. The user creates a custom endpoint able to receive the call from the Identity Service
183+
1. The identity service makes a test call to confirm the endpoint can be called by the Identity Service
184+
1. The User calls Graph API to request to add a user to an access package
185+
1. The Identity Service is added to the queue triggering the backend workflow
186+
1. Entitlement Management Service request processing calls the logic app with the request payload
187+
1. Workflow expects the accepted code
188+
1. The Entitlement Management Service waits for the blocking custom action to resume
189+
1. The customer system calls the request resume API to the identity service to resume processing the request
190+
1. The identity service adds the resume request message to the Entitlement Management Service queue resuming the backend workflow
191+
1. The Entitlement Management Service is resumed from the blocked state
192+
180193
An example of a resume request payload is:
181194

182195
``` http
Loading
128 KB
Loading

articles/active-directory/manage-apps/bread/toc.yml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -81,3 +81,15 @@
8181
- name: Application management
8282
tocHref: /azure/app-provisioning/
8383
topicHref: /azure/active-directory/manage-apps/index
84+
85+
- name: Azure
86+
tocHref: /azure/
87+
topicHref: /azure/index
88+
items:
89+
- name: Active Directory
90+
tocHref: /azure/active-directory-b2c/
91+
topicHref: /azure/active-directory/index
92+
items:
93+
- name: Application management
94+
tocHref: /azure/active-directory-b2c/
95+
topicHref: /azure/active-directory/manage-apps/index

0 commit comments

Comments
 (0)